An attacker might use different scripting methods depending on the situation. In this video, you’ll learn about PowerShell scripts, Python, shell scripts, macros, and Visual Basic for Applications (VBA).
<< Previous Video: Denial of Service Next: Threat Actors >>