

Episode 50: How Attackers Use PowerShell
Jul 19, 2023
Discover the sinister side of PowerShell as cyber adversaries exploit its capabilities for malicious attacks. The discussion reveals how attackers use PowerShell for everything from reconnaissance to bypassing security measures. Techniques like fileless malware and SQL server exploitation are analyzed, showcasing the tool's dual-edged nature. The speakers emphasize the importance of monitoring PowerShell to defend against these evolving threats while highlighting its indispensable role in both offensive and defensive cybersecurity.
Chapters
Transcript
Episode notes
1 2 3 4 5 6
Intro
00:00 • 2min
PowerShell: A Double-Edged Sword
02:26 • 10min
Exploiting PowerShell: Bypasses and Security Challenges
12:17 • 2min
Exploitation of PowerShell in Cyber Attacks
14:17 • 10min
Exploiting SQL Servers through PowerShell Techniques
24:02 • 2min
The Power of PowerShell in Cybersecurity
26:00 • 2min