Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Command and Control with Empire

PowerShell has quickly become the standard in enterprise networks. In this course you will learn how to leverage Empire to perform command and control techniques during a red team engagement.

Intermediate
22m
(9)

Created by Rishalin Pillay

Last Updated Jul 31, 2025

Course Thumbnail
  • Course

Command and Control with Empire

PowerShell has quickly become the standard in enterprise networks. In this course you will learn how to leverage Empire to perform command and control techniques during a red team engagement.

Intermediate
22m
(9)

Created by Rishalin Pillay

Last Updated Jul 31, 2025

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Are you looking to use Empire in a red team engagement? In this course, Command and Control with Empire, you’ll learn how to utilize Empire for command and control in a red team environment. First, you’ll see how to leverage multi-hop proxies for C2. Next, you’ll learn to apply file upload capabilities and registry commands to establish remote access. Finally, you’ll explore to simulate establishing a C2 over a non-standard port. When you’re finished with this course, you’ll have the skills and knowledge to execute ingress tool transfer (T1105), remote access software (T1219), non-standard port (T1571) and multi-hop proxy (T1090.003) using Empire.

Command and Control with Empire
Intermediate
22m
(9)
Table of contents

About the author
Rishalin Pillay - Pluralsight course - Command and Control with Empire
Rishalin Pillay
23 courses 4.5 author rating 149 ratings

Rishalin Pillay has over 12 years of cybersecurity experience and has acquired a vast amount of skills consulting for Fortune 500 companies while taking part in projects performing tasks in network security design, implementation, and vulnerability analysis. He holds many certifications that demonstrate his knowledge and expertise in the cybersecurity field. He is an author and content contributor to a number of books.

Get started with Pluralsight