
Episode 50: How Attackers Use PowerShell
The Cyber Threat Perspective
00:00
PowerShell: A Double-Edged Sword
This chapter explores the powerful capabilities of PowerShell as a tool for both legitimate IT management and malicious activities in modern environments. It highlights the pre-installed nature of PowerShell on Windows systems, making it a preferred option for attackers, while also discussing its integration and ease of use for scripting. The speakers delve into how PowerShell is utilized during cyber attacks, particularly in reconnaissance and enumeration, underscoring its vital role in both offense and defense in the digital landscape.
Transcript
Play full episode