Skip to main content

PowerShell for Ethical Hackers

                                                                                                             

PowerShell For Ethical Hackers Blog Series 


Hello my hacking buddies, Finally i am back with my blog series PowerShell for Ethical Hackers. we all know what is powershell and it easies our task same like linux bash scripting. in this blog series i'll show you some useful test cases which i have performed in real life penetration testing and i am going to show you how to write powershell script from basics to advance level. So, let's Start 😊😉

Part 1: Introduction to PowerShell, why PowerShell is important for Ethical Hackers and PowerShell Framework.

Penetration Testing using PowerShell

PowerShell: PowerShell is an interactive command line shell for windows same like bash shell in       Linux. PowerShell is designed for doing automated system tasks i.e. (you can check installed USB     devices in one or multiple computers in your network), batch processing etc. it is developed in .NET   Framework.

What Ethical Hacker can do using PowerShell

As a penetration tester we can perform so many awesome things using PowerShell. Suppose you got access of windows system using remote exploit, now the question is what is your aim and what’s next here PowerShell comes in the picture. You can do such things which are mentioned below.
1    1.        Recon
2.       Backdoors
3.       Incident Response
4.       Shells
5.       Exfiltration   
6.       Escalation
7.       Reverse Engineering

PowerShell Frameworks

There are some Pentesting frameworks which are publicly available on the internet which you can use for do penetration testing.
1    1.    PowerSploit
2.       Nishang
3.       PowerShell Empire
4.       Pentestly

PowerSploit: PowerSploit is a post exploitation framework for windows systems. It is comprised of the following modules. Code Execution, Script Modification, Exfiltration, AV Bypass, Persistence etc.

Nishang: Nishang also includes great stuff for post exploitation. You can perform Brute forcing on SQL server AD Server, Pivoting in Network, MITM attacks etc. One of the awesome feature Nishang has Powerpreter. Powerpreter is a script module which makes it useful in scenarios like drive-by-download, document attachments, webshells etc. where one may like to pull all the functionality in Nishang in a single file or where deployment is not easy to do. Powerpreter has persistence capabilities too

PowerShell Empire: Empire is purely PowerShell post exploitation Framework. It implements the ability of run the PowerShell agent without the need of powershell.exe

Pentestly: Pentestly is a combination of python and PowerShell Scripts and it provide a user interface from where we can perform such tasks.

Thats all for this Part. Stay Tuned for next post. 😊😉

#HappyHacking #Blogger #Security #Learner 






Comments


  1. such a usefull message. thanks for sharing to us. keep update a more new blogs for us to know more.
    Ethical Hacking Course in Chennai
    Hacking Course in Chennai

    ReplyDelete
  2. This was an excellent blog I learn something from these blog about Ethical Hacking Online Training . Try yourself once.

    ReplyDelete
  3. Excellentm idea and the subject at the top of magnificence and I am happy to this post. Interesting post! Keep sharing such kind of worthy information.
    Hacking Course in Chennai
    Hacking Course in Bangalore
    Hacking Training in Tambaram
    Hacking in Nungambakkam

    ReplyDelete
  4. Thanks for sharing an information to us. If someone want to know about Ethical Hacking. I think this is the right place for you! ceh Training.
    http://ceh.xploreitcorp.com/

    ReplyDelete
  5. We provide best ethical hacking certification course. we give following courses with best experienced staffs Network Monitoring Hacking Technique,Cryptography, penetration testing. The CEH(Certified Ethical Hacker)
    https://elysiumacademy.org/training-center-bhopal/

    ReplyDelete
  6. it is nice to read your blog and im really appreciate to read that.thanks to you for giving wonderfull ideas..thankyou
    ethical hacking training in chennai
    ethical hacking course in coimbatore
    best ethical hacking institute in bangalore

    ReplyDelete
  7. Good blog for the people who are seeking information about the technology.
    Awesome work keep it up. Simply superb.
    ethical hacking course in coimbatore
    hacking course in coimbatore
    ethical hacking training in coimbatore

    ReplyDelete

Post a Comment

Popular posts from this blog

PowerShell for Ethical Hackers Part 3 Introduction to PowerShell ISE & PowerShell ISE Add-On

PowerShell for Ethical Hackers Blog Series                       Part 3: Introduction to PowerShell ISE and PowerShell  ISE Add-On PowerShell ISE is Integrated Scripting Environment. In PowerShell ISE you can run commands, write scripts ,test and debug your scripts in Graphic User Interface Application.  Windows PowerShell ISE provides you many features which you can use in PowerShell ISE for do your task easy some of the features are mentioned below. Multiline Editing Selective Execution PowerShell ISE Modules Restart Manager and Auto Save Description of PowerShell ISE Features Multiline Editing: Multi Line editing is a nice feature in PowerShell ISE it saves a lot of time because at a same time you can edit multiple lines in a same file. Selective Execution:   Selective execution provides you capability to run the selective code which you want to test it means you can select...

Session HI-Jacking

                       Session Hijacking in XSS to MYSQL File Hi, after a long Time i am coming with my new post how to Hijack The someone Session. sounds Interesting. is it possible to hijacking or steal someone cookie or someone Session. Yes! it's possible. I am going to telling you how's it Possible.   First! of All, it is also a Web-App Vulnerability. In OWASP TOP-10  A-2 Broken authentication   and Session managment. Covers the Session managment issues. (1) Session sniffing (2) Session fixation (3) Session hijacking First, for non-technical persons, they want to know what is Session or what is Cookie? A session can be defined as a server-side storage of information that is desired to persist throughout the user's interaction with the web site or web application.  A cookie is a small piece of text stored on a user's comp...