Security in Obscurity

A course by Jeff Stein

Command and Control with PoshC2

Pluralsight, October 2020

Command and Control with PoshC2 is a course that is published by Pluralsight. You can access the full course on Pluralsight here. You need a Pluralsight subscription to watch this course. If you do not already have a subscription, I have a partnership with Pluralsight and the banner above features a link to get a FREE trial if you are interested in viewing the course in its entirety. Below you can find a sample of the course contents.

PoshC2 is a powerful tool that uses PowerShell to control a victim system toward furthering red teaming objectives beyond exploitation throughout the remaining life of an engagement. powerful tool that uses PowerShell to control a victim system toward furthering red teaming objectives beyond exploitation throughout the remaining life of an engagement. When you are finished with this course, you’ll have the skills and knowledge to execute these techniques Application Layer Protocol: Web Protocols-T1071.001, Account Discovery: Local Account- T1087.001 & Remote Access Software-T1219 using PoshC2.

Sample

---

Course Profile

Topic: Command and Control
Series: Red Team Tools
Level: Intermediate

Prerequisites

Viewers should have a basic understanding of the windows command line. Knowledge of the Mitre Att&ck framework and the Cyber Kill Chain is recommended but not required.

Table of Contents
Module One
1. Course Overview [1:12]
Module Two
1. Introduction [3:04]
2. Gaining Initial Access with the PoshC2 Implant [8:22]
3. Using PoshC2 to Enumerate a Target and Exfiltrate Data [6:10]
4. Elevate Account Privileges and Move Laterally Across a Victim Network [7:02]
Module Three
1. Additional Resources [1:43]


Tags

Security Networking Wireless Malware Ethical Hacking Email Phishing PowerShell Python Splunk Monitoring Firewall Red Team Tools Blue Team Tools Cloud Initial Access Privilege Escalation Credential Access Lateral Movement Command & Control