Date and time
July 29, 30 and 31 | 10:00 EEST or 18:00 EEST
Agenda
PowerShell is universal. All your users have access to PowerShell. Hold it, are you going to tell me that it’s just your admins and privileged users who can access PowerShell? Well, okay then. In that case, do you exactly know what your admins do with PowerShell? What commands do they execute? What scripts do they invoke?
It is critical to track PowerShell activities granularly to stay away from attacks. Attackers can leverage PowerShell for recon, initial access, privilege escalation, lateral movement, defense evasion, credential access, discovery, and data exfiltration. We have put together three compelling webinars that can help your red teams perform recon, defense evasion, and discovery.
Here's what’s in store for you:
- 10 PowerShell tricks for reconnaissance
- 6 PowerShell tricks for discovery
- 3 PowerShell tricks for Defense Evasion