Description
Post-exploitation with PowerShell course. In red team combat, after gaining initial access to the target environment, you must level up, stabilize, and achieve your goals. Since your goal is to remain hidden, it’s best to use built-in Windows features such as PowerShell to perform post-exploitation actions. In this Post-Exploit Penetration with PowerShell course, you will learn how to perform all post-exploit actions using only native Windows commands.
What will you learn
- How to increase your scores in a compromised system
- How to create stability to access the system at any time
- How to collect and extract sensitive data
This course is suitable for people who
- Want to learn how to perform post-exploitation steps using PowerShell
- Are looking to improve their penetration testing skills
- Want to learn more about Windows’ built-in security features.
Course details
Course headings
Photos from the Post Exploitation Using PowerShell course
Example video course
installation instructions
Once extracted, watch using your favorite player.
English subtitles
Quality: 720p
Download link
Password for file(s): www.downloadly.ir
size
190 MB