Date and time
February 29 | 12:00 EET
Why attend this webinar?
Of course, running scripts and downloading payloads using PowerShell will raise alarms. How can that be detonated? Well, dedicated PowerShell scripts can disable defender and other layers of defenses, help harvest credentials, and gather all the information to take a network down.
Red teams should take advantage of these scripts before the attackers do.
- Bypass Defender and anti-malware scan interface
- Extract credentials from stored Wi-Fi passwords and other means
- Override PowerShell execution policies and gather all information about a victim