Date and time
August 27 | 13:00 EEST
Why attend this webinar?
PowerShell can give an attacker a lot of opportunities to discover and hand-pick a target which they can zero in on and take down. Attackers, with zero privileges, can look for lucrative and sensitive network resources and avenues to exfiltrate them stealthily.
In this webinar, we will look at 6 PowerShell scripts that you need to test out in your environment before the attackers do and identify vulnerable resources and secure them. The webinar will also cover detection mechanisms for such executions to keep attackers at bay.
What’s in store this webinar?
- Identify user account permissions and modify them with no privileges
- Discover critical resources such as domain controllers and servers
- Identify avenues to exfiltrate date seamlessly by enabling USB ports or tweaking firewall policies