Hacking With PowerShell: Red Team
As we explored in part one, PowerShell can be used for good and bad. We also talked about how monitoring and proper auditing is key. The reason why is that, PowerShell is being used in the wild for malicious activity. As with everything, it has its weaknesses and certain security controls can’t be heavily relied on.
Let’s go through an example. PowerShell has an Execution-Policy which allows you to…