Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Command and Control with PoshC2

PoshC2 is a powerful tool that uses PowerShell to control a victim system toward furthering red teaming objectives beyond exploitation throughout the remaining life of an engagement. In this course, you will learn Command and Control using PoshC2.

Intermediate
27m
(5)

Created by Jeff Stein

Last Updated Oct 15, 2020

Course Thumbnail
  • Course

Command and Control with PoshC2

PoshC2 is a powerful tool that uses PowerShell to control a victim system toward furthering red teaming objectives beyond exploitation throughout the remaining life of an engagement. In this course, you will learn Command and Control using PoshC2.

Intermediate
27m
(5)

Created by Jeff Stein

Last Updated Oct 15, 2020

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

On the Windows OS, PowerShell can offer effective control of a system, this course will give you the skills and understanding to harness PowerShell to further your red teaming objectives towards command and control of a victim system. In this course, Command and Control with PoshC2 you’ll cover how to utilize PoshC2 to execute privilege escalation in a red team environment. First, you’ll demonstrate ways to gain system access and evade detection using the PoshC2 implant. Next, you’ll apply the built-in PoshC2 modules to send commands to enumerate the victim system. Finally, you’ll simulate the harvesting of credentials to escalate privilege with PowerShell. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques Application Layer Protocol: Web Protocols-T1071.001, Account Discovery: Local Account- T1087.001 & Remote Access Software-T1219 using PoshC2.

Command and Control with PoshC2
Intermediate
27m
(5)
Table of contents

About the author
Jeff Stein  - Pluralsight course - Command and Control with PoshC2
Jeff Stein
3 courses 4.4 author rating 13 ratings

Jeff Stein is an Information Security Architect. He holds a master’s degree in Information Security & Assurance and numerous security and IT certifications, including his CISSP.

Get started with Pluralsight