Blog
Informative, up-to-date and exciting - the Oneconsult Cybersecurity Blog.

PowerShell I – Introduction

by Frank Ully

This article is the first in a multi-part series about Windows PowerShell and how attackers abuse it, how incident responders can detect these attacks – and how IT security managers can prevent them in the first place. Advanced attackers are regularly using scripts written in PowerShell as part of their attack toolchain. This is because Windows PowerShell, Microsoft’s task automation and configuration management framework, as well as the script language of the same name are now tightly integrated into modern Windows installations. [read the German article]

Published on: 18.05.2018

Share

Never miss the latest news on cyber security topics again? Sign up for our newsletter

Autor

Keine Beschreibung verfügbar.

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 12:00 p.m. and 1:00 p.m. – 5:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

QR_CSIRT_2022_EN@2x
Add CSIRT to contacts