
FLASH SALE: Ends May 22!
Udemy online courses up to 85% off.
Get Deal
Unicorn is a tool that penetration testers and ethical hackers can use to generate PowerShell commands to enable the execution of shellcode on Windows hosts. In this course, Execution with Unicorn, you’ll cover how to utilize Unicorn to execute PowerShell downgrade attacks in a red team environment. First, you’ll see how to use Unicorn for a PowerShell attack. Next, you’ll discover Unicorn’s features to create additional attacks. Finally, you’ll learn to simulate client execution exploits by testing payloads on a vulnerable host. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques T1059.001: Command and Scripting Interpreter: PowerShell, and T1023: Exploitation for Client Execution using Unicorn. More importantly, knowing how these techniques can be used against you will lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.