Command and Control using Powershell and your favorite website
When I went to Derbycon 3.0 last year, I saw @mattifestation and @obscuresec‘s talk about using pre-existing windows components for post-exploitation. What I absolutely loved was the section on using Powershell and a website for C2 after a compromise. In a nutshell, you gain access to a system and create some way of getting script … Continue reading Command and Control using Powershell and your favorite website
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed