ThreatTurtle
Published in

ThreatTurtle

Hacking With PowerShell: Red Team

As we explored in part one, PowerShell can be used for good and bad. We also talked about how monitoring and proper auditing is key. The reason why is that, PowerShell is being used in the wild for malicious activity. As with everything, it has its weaknesses and certain security controls can’t be heavily relied on.

Let’s go through an example. PowerShell has an Execution-Policy which allows you to…

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store