The Cyber Threat Perspective cover image

Episode 50: How Attackers Use PowerShell

The Cyber Threat Perspective

00:00

PowerShell: A Double-Edged Sword

This chapter explores the powerful capabilities of PowerShell as a tool for both legitimate IT management and malicious activities in modern environments. It highlights the pre-installed nature of PowerShell on Windows systems, making it a preferred option for attackers, while also discussing its integration and ease of use for scripting. The speakers delve into how PowerShell is utilized during cyber attacks, particularly in reconnaissance and enumeration, underscoring its vital role in both offense and defense in the digital landscape.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app