Execution with Unicorn
Are you looking for a tool that simplifies the process of exploiting Windows hosts using a variety of techniques? In this course, you will learn execution using Unicorn.
Unicorn is a tool that penetration testers and ethical hackers can use to generate PowerShell commands to enable the execution of shellcode on Windows hosts. In this course, Execution with Unicorn, you’ll cover how to utilize Unicorn to execute PowerShell downgrade attacks in a red team environment. First, you’ll see how to use Unicorn for a PowerShell attack. Next, you’ll discover Unicorn’s features to create additional attacks. Finally, you’ll learn to simulate client execution exploits by testing payloads on a vulnerable host. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques T1059.001: Command and Scripting Interpreter: PowerShell, and T1023: Exploitation for Client Execution using Unicorn. More importantly, knowing how these techniques can be used against you will lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.
Author Name: Matt Glass
Author Description:
Matt Glass is a Service Delivery Manager in Naples, Italy, working as a government contractor. Matt has 15 years of IT experience in a variety of roles. Consistently finding joy in developing the skills of others and helping their careers, he joined Pluralsight in 2017 to pass on the lessons he learned. Matt is married and the father of four children.
There are no reviews yet.