Advisory 2020-008: Copy-Paste ... - ACSC | Cyber.gov.au

T1059.001 – PowerShell. The ACSC has identified the use of PowerShell scripts to conduct malicious activity on compromised systems. Examples of the actor’s use of PowerShell include: A PowerShell reverse shell payload used in conjunction with Telerik UI exploitation (see Appendix D – PowerShell … ................
................