Open Source PowerShell-Written Post Exploitation Frameworks Used by Cyber Espionage Groups

Tjada Nelson, Houssain Kettani. Open Source PowerShell-Written Post Exploitation Frameworks Used by Cyber Espionage Groups. In 3rd International Conference on Information and Computer Technologies, ICICT 2020, San Jose, CA, USA, March 9-12, 2020. pages 451-456, IEEE, 2020. [doi]

@inproceedings{NelsonK20,
  title = {Open Source PowerShell-Written Post Exploitation Frameworks Used by Cyber Espionage Groups},
  author = {Tjada Nelson and Houssain Kettani},
  year = {2020},
  doi = {10.1109/ICICT50521.2020.00078},
  url = {https://doi.org/10.1109/ICICT50521.2020.00078},
  researchr = {https://researchr.org/publication/NelsonK20},
  cites = {0},
  citedby = {0},
  pages = {451-456},
  booktitle = {3rd International Conference on Information and Computer Technologies, ICICT 2020, San Jose, CA, USA, March 9-12, 2020},
  publisher = {IEEE},
  isbn = {978-1-7281-7283-5},
}