Pentest Com POWERSHELL - Overview
Pentest Com POWERSHELL - Overview
Pentest Com POWERSHELL - Overview
•
•
•
•
• HTTPS://WWW.LINKEDIN.COM/IN/JOAS-ANTONIO-DOS-SANTOS/
•
•
•
•
•
•
•
•
•
• HTTPS://LEANPUB.COM/POWERSHELL101
• HTTPS://DOCS.MICROSOFT.COM/PT-BR/POWERSHELL/SCRIPTING/LEARN/PS101/01-GETTING-
STARTED?VIEW=POWERSHELL-7
• HTTPS://WWW.COMPARITECH.COM/NET-ADMIN/POWERSHELL-CHEAT-SHEET/
• HTTP://RAMBLINGCOOKIEMONSTER.GITHUB.IO/IMAGES/CHEAT-SHEETS/POWERSHELL-BASIC-CHEAT-SHEET2.PDF
• HTTPS://GIST.GITHUB.COM/PCGEEK86/336E08D1A09E3DD1A8F0A30A9FE61C8A
• HTTPS://GITHUB.COM/LAZYWINADMIN/POWERSHELL
• HTTPS://GITHUB.COM/CLYMB3R/POWERSHELL
• HTTPS://DOCS.MICROSOFT.COM/PT-BR/POWERSHELL/SCRIPTING/SAMPLES/SAMPLE-SCRIPTS-FOR-
ADMINISTRATION?VIEW=POWERSHELL-7
• HTTPS://WWW.UDEMY.COM/COURSE/APRENDA-POWERSHELL-DO-ZERO/
• HTTPS://WWW.UDEMY.COM/COURSE/AUTOMATIZANDO-ADMINISTRACAO-COM-POWERSHELL-CURSO-10961/
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=XODFGOJFR9Q
•
•
• HTTPS://MEDIUM.COM/@NALLAMUTHU/POWERSHELL-PORT-SCAN-BF27FC754585
• HTTPS://SID-500.COM/2017/11/12/TEST-PORT-USE-POWERSHELL-AS-A-PORT-SCANNER/
• HTTPS://TECHCOMMUNITY.MICROSOFT.COM/T5/ITOPS-TALK-BLOG/POWERSHELL-BASICS-HOW-TO-SCAN-OPEN-PORTS-WITHIN-A-
NETWORK/BA-P/924149
• HTTPS://GITHUB.COM/BORNTOBEROOT/POWERSHELL_IPV4PORTSCANNER
• HTTP://5UBTOOLS.BLOGSPOT.COM/
• HTTPS://GITHUB.COM/Z3R0TH-13/ENUM
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=QKZSIBEKAC0&AB_CHANNEL=TECHSNIPS
• HTTPS://GITHUB.COM/PYROTEK3/POWERSHELL-AD-RECON
• HTTPS://BLOG.STEALTHBITS.COM/PERFORMING-DOMAIN-RECONNAISSANCE-USING-POWERSHELL/
• HTTPS://MEDIUM.COM/@SMURF3R5/RECON-DOMAIN-SHARES-872914697980
• HTTPS://WWW.TRUSTEDSEC.COM/BLOG/POWERSHELL-RECONNAISSANCE/
• HTTPS://WWW.HEBUNILHANLI.COM/WONDERLAND/AD-PENTEST/RECON-WITH-POWERSHELL/
• HTTPS://PERICIACOMPUTACIONAL.COM/PENTESTING-WITH-POWERSHELL-IN-SIX-STEPS/
• HTTPS://GITHUB.COM/ELITELOSER/PSNMAP
• HTTPS://MEDIUM.COM/@DRAG0N/SOME-USEFUL-INTERESTING-POWERSHELL-SCRIPTS-
9B9490CEE0CD
• HTTPS://ADSECURITY.ORG/?P=2535
• HTTPS://WWW.VARONIS.COM/BLOG/POWERVIEW-FOR-PENETRATION-TESTING/
• HTTPS://WWW.SANS.ORG/BLOG/PEN-TEST-POSTER-WHITE-BOARD-POWERSHELL-BUILT-IN-PORT-
SCANNER/
• HTTPS://GITHUB.COM/SCIPAG/POWERSHELLUTILITIES
• HTTPS://WWW.ADAMCOUCH.CO.UK/CONDUCTING-POWERSHELL-PORT-SCAN/
• HTTPS://WWW.INFOSECMATTER.COM/MINIMALISTIC-TCP-AND-UDP-PORT-SCANNER/
• HTTPS://GITHUB.COM/XORRIOR/REMOTERECON
• HTTPS://GITHUB.COM/MATTIFESTATION/PSREFLECT
• HTTPS://GITHUB.COM/HARMJ0Y/CHEATSHEETS/BLOB/MASTER/POWERUP.PDF
• HTTPS://GITHUB.COM/HARMJ0Y/CHEATSHEETS/BLOB/MASTER/POWERSPLOIT.PDF
• HTTPS://GITHUB.COM/HARMJ0Y/CHEATSHEETS/BLOB/MASTER/EMPIRE.PDF
• HTTPS://GITHUB.COM/HARMJ0Y/CHEATSHEETS/BLOB/MASTER/POWERVIEW.PDF
• HTTPS://GITHUB.COM/POWERSHELLMAFIA/POWERSPLOIT/BLOB/MASTER/PRIVESC/POWERUP.P
S1
• HTTPS://WWW.HARMJ0Y.NET/BLOG/POWERSHELL/POWERUP-A-USAGE-GUIDE/
• HTTPS://RECIPEFORROOT.COM/ADVANCED-POWERUP-PS1-USAGE/
• HTTPS://JANIKVONROTZ.GITHUB.IO/POWERSHELL-POWERUP/
• HTTPS://MEDIUM.COM/BUGBOUNTYWRITEUP/PRIVILEGE-ESCALATION-IN-WINDOWS-
380BEE3A2842
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=DNWWTJFQW78&AB_CHANNEL=METASPLOITATIO
N
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=DLJYKGFKOKQ&AB_CHANNEL=SECURITYWEEKLY
• HTTPS://GITHUB.COM/POWERSHELLMAFIA/POWERSPLOIT
• HTTPS://PENTESTLAB.BLOG/TAG/POWERSPLOIT/
• HTTPS://WWW.CYBERPUNK.RS/POWERSPLOIT-POWERSHELL-POST-EXPLOITATION-FRAMEWORK
• HTTPS://WWW.DARKNET.ORG.UK/2015/12/POWERSPLOIT-POWERSHELL-POST-EXPLOITATION-
FRAMEWORK/
• HTTPS://ATTACK.MITRE.ORG/SOFTWARE/S0194/
• HTTPS://ADSECURITY.ORG/?TAG=POWERSPLOIT
• HTTPS://MEDIUM.COM/@BENOIT.SEVENS/POWERSHELL-AV-EVASION-4E4BB6A6A961
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=OTPPNWBEADA&AB_CHANNEL=CHIEFRIVER
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=LELL6QA-REY&AB_CHANNEL=METASPLOITATION
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=B-XJNMFZ7LS&AB_CHANNEL=%5BMISTER_BERT0NI%5D
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=ZBMOS_FNXNG&AB_CHANNEL=SECURITYNOTES
• HTTPS://DANIELDONDA.COM/2019/04/07/POWERSHELL-EMPIRE/
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=52XKWBDMUUM&AB_CHANNEL=HACKERSPLOIT
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=0GHS3U9ZMKI&AB_CHANNEL=GUSKHAWAJA
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=67EXQPHK2SE&AB_CHANNEL=SECKC
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=9-KWVLJDXWS&AB_CHANNEL=ROOTSPLOIT
• HTTPS://WWW.POWERSHELLEMPIRE.COM/
• HTTPS://WWW.CYBERPUNK.RS/EMPIRE-POWERSHELL-POST-EXPLOITATION-FRAMEWORK
• HTTPS://NULL-BYTE.WONDERHOWTO.COM/HOW-TO/USE-POWERSHELL-EMPIRE-GETTING-STARTED-WITH-POST-
EXPLOITATION-WINDOWS-HOSTS-0178664/
• HTTPS://WWW.HACKINGARTICLES.IN/HACKING-WITH-EMPIRE-POWERSHELL-POST-EXPLOITATION-AGENT/
• HTTPS://MEDIUM.COM/@RATIROS01/TRYHACKME-PS-EMPIRE-BD96FBF822CC
• HTTPS://BLOG.STEALTHBITS.COM/NEXT-GEN-OPEN-SOURCE-C2-FRAMEWORKS/
• HTTPS://GITHUB.COM/JAREDHAIGHT/INVOKE-METASPLOITPAYLOAD
• HTTPS://MEDIUM.COM/SWLH/FUN-WITH-POWERSHELL-PAYLOAD-EXECUTION-AND-EVASION-F5051FD149B2
• HTTPS://GITHUB.COM/TRUSTEDSEC/UNICORN
• HTTPS://GITHUB.COM/LOADENMB/TVASION
• HTTPS://THREAT.TEVORA.COM/DISSECTING-VEIL-EVASION-POWERSHELL-PAYLOADS-AND-CONVERTING-TO-A-BIND-SHELL/
• HTTPS://HAKIN9.ORG/XENCRYPT-A-POWERSHELL-SCRIPT-ANTI-VIRUS-EVASION-TOOL/
• HTTPS://ARNO0X0X.WORDPRESS.COM/2016/04/13/METERPRETER-AV-IDS-EVASION-POWERSHELL/
• HTTPS://HACK-ED.NET/2016/04/04/VEIL-EVASION-PAYLOADS-MADE-EASY/
• HTTPS://KAIZENSECURITY.WORDPRESS.COM/2016/08/19/METASPLOIT-AV-EVASION-WITH-POWERSHELL/
• HTTPS://WWW.BLACKHAT.COM/DOCS/EU-17/MATERIALS/EU-17-THOMPSON-RED-TEAM-TECHNIQUES-FOR-EVADING-
BYPASSING-AND-DISABLING-MS-ADVANCED-THREAT-PROTECTION-AND-ADVANCED-THREAT-ANALYTICS.PDF
• HTTPS://WWW.BLACKHAT.COM/DOCS/US-14/MATERIALS/US-14-KAZANCIYAN-INVESTIGATING-POWERSHELL-ATTACKS-
WP.PDF
• HTTPS://RESOURCES.INFOSECINSTITUTE.COM/POWERSHELL-FOR-PENTESTERS-PART-5-REMOTING-WITH-
POWERSHELL/
• HTTPS://PENTESTN00B.WORDPRESS.COM/2016/08/22/POWERSHELL-PSREMOTING-PWNAGE/
• HTTPS://KALILINUXTUTORIALS.COM/EVIL-WINRM-HACKING-PENTESTING/
• HTTPS://WWW.RAPID7.COM/DB/MODULES/EXPLOIT/WINDOWS/LOCAL/POWERSHELL_REMOTING
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=TVGJ-9FJKXE&AB_CHANNEL=HAK5
• HTTPS://GIST.GITHUB.COM/EGRE55/C058744A4240AF6515EB32B2D33FBED3
• HTTPS://GITHUB.COM/SWISSKYREPO/PAYLOADSALLTHETHINGS/BLOB/MASTER/METHODOLOGY%20AND%20RESOURCES/
REVERSE%20SHELL%20CHEATSHEET.MD
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=NJ5XBHRTWWA&AB_CHANNEL=CYBERSECURITYLEARNING
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=KKFRJTLM5LI&AB_CHANNEL=INFOSECADDICTS
• HTTPS://HACKERSINTERVIEW.COM/OSCP/REVERSE-SHELL-ONE-LINERS-OSCP-CHEATSHEET/
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=KKFRJTLM5LI&AB_CHANNEL=INFOSECADDICTS
• HTTPS://WWW.OFFENSIVE-SECURITY.COM/OFFSEC/KALI-LINUX-POWERSHELL-PENTESTING/
• HTTPS://SECURITYONLINE.INFO/REVERSE-POWERSHELL/
• HTTPS://BLOG.NETSPI.COM/POWERSHELL-REMOTING-CHEATSHEET/
• HTTPS://WWW.IRED.TEAM/MISCELLANEOUS-REVERSING-FORENSICS/GET-INJECTEDTHREAD
• HTTPS://MEDIUM.COM/@THREATPOINTER/PENTESTING-POWERSHELL-REMOTING-FA605EF325D4
• HTTPS://GITHUB.COM/JODYWEIJERS/BADUSB-DIGISPARK
• HTTPS://WWW.ZDNET.COM/ARTICLE/RARE-BADUSB-ATTACK-DETECTED-IN-THE-WILD-AGAINST-US-
HOSPITALITY-PROVIDER/
• HTTPS://HACKADAY.COM/TAG/BADUSB/
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=IAH5RUYO2VY&AB_CHANNEL=DIMUSTECH
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=M6BHXX75RMS&AB_CHANNEL=HAK5
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=M0AWKEF0B8C&AB_CHANNEL=IMMUNETECHNOLOGYINS
TITUTE
• HTTPS://GITHUB.COM/SCREETSEC/BRUTAL
• HTTPS://ATTACK.MITRE.ORG/TECHNIQUES/T1059/001/
• HTTPS://MEDIUM.COM/@SUBHAMMISRA45/LATERAL-MOVEMENT-POWERSHELL-REMOTING-89DA402A9885
• HTTPS://POSTS.SPECTEROPS.IO/OFFENSIVE-LATERAL-MOVEMENT-1744AE62B14F
• HTTPS://PT.SLIDESHARE.NET/KIERANJACOBSEN/LATERAL-MOVEMENT-WITH-POWER-SHELL-2
• HTTPS://WWW.IRED.TEAM/OFFENSIVE-SECURITY/LATERAL-MOVEMENT/WMI-+-POWERSHELL-DESIRED-STATE-
CONFIGURATION-LATERAL-MOVEMENT
• HTTPS://GENNAROMIGLIACCIO.COM/LATERAL-MOVEMENT-TACTICS-AND-TECHNIQUES
• HTTPS://REDCANARY.COM/BLOG/LATERAL-MOVEMENT-WINRM-WMI/
• HTTPS://WWW.FORWARDDEFENSE.COM/PDFS/LATERAL-MOVEMENT-ANALYSIS.PDF
• HTTPS://WWW.SNAPLABS.IO/INSIGHTS/LATERAL-MOVEMENT-METHODS-AND-GOOD-PRACTICES
• HTTPS://GIST.GITHUB.COM/JAREDCATKINSON/C95FD1E4E76A4B9B966861F64782F5A9
• HTTPS://ATTACK.MITRE.ORG/SOFTWARE/S0029/
• HTTPS://WWW.OFFENSIVE-SECURITY.COM/METASPLOIT-UNLEASHED/PSEXEC-PASS-HASH/
• HTTPS://WWW.CONTEXTIS.COM/DE/BLOG/LATERAL-MOVEMENT-A-DEEP-LOOK-INTO-PSEXEC
• HTTPS://WWW.MINDPOINTGROUP.COM/BLOG/LATERAL-MOVEMENT-WITH-PSEXEC/
• HTTPS://REDCANARY.COM/BLOG/THREAT-HUNTING-PSEXEC-LATERAL-MOVEMENT/
• HTTPS://MEDIUM.COM/@UPADHYAY.VARUN/PASS-THE-HASH-ATTACK-B0F214B2884A
• HTTPS://PERICIACOMPUTACIONAL.COM/WINDOWS-ACCOUNT-HIJACKING-PSEXEC-E-SUAS-POSSIBILIDADES/
• HTTPS://PENTESTLAB.BLOG/TAG/PSEXEC/
• HTTPS://WWW.TOSHELLANDBACK.COM/2017/02/11/PSEXEC/
• HTTPS://WWW.POFTUT.COM/USE-PSEXEC-TOOLS-RUN-COMMANDS-GET-SHELL-REMOTE-WINDOWS-SYSTEMS/
• HTTPS://WWW.IRED.TEAM/OFFENSIVE-SECURITY/LATERAL-MOVEMENT/LATERAL-MOVEMENT-WITH-PSEXEC
• HTTPS://WWW.VARONIS.COM/BLOG/HOW-TO-USE-POWERSHELL-FOR-PRIVILEGE-ESCALATION-WITH-LOCAL-COMPUTER-ACCOUNTS/
• HTTPS://GITHUB.COM/FRIZB/WINDOWS-PRIVILEGE-ESCALATION
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=-SBXN-CGUD0&AB_CHANNEL=PENTESTERACADEMYTV
• HTTPS://HAKIN9.ORG/PRIVESCCHECK-PRIVILEGE-ESCALATION-ENUMERATION-SCRIPT-FOR-WINDOWS/
• HTTPS://GITHACKTOOLS.BLOGSPOT.COM/2019/04/WINROOTHELPER-WINDOWS-PRIVILEGE-ESCALATION-POWERSHELL-SCRIPT.HTML
• HTTPS://WWW.HACKINGARTICLES.IN/WINDOW-PRIVILEGE-ESCALATION-VIA-AUTOMATED-SCRIPT/
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=VLKPCSQW8QY&AB_CHANNEL=UBEERILABS
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=BANOHAIAQ7U&AB_CHANNEL=SANSPENTESTTRAINING
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=2VZOSUJ4NWU&AB_CHANNEL=CYBERSTORM-WARFAREINTHE5THDOMAIN
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=V0ZYORQ0EEY&AB_CHANNEL=POWERSHELLEMPIRETUTORIALS
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=DZJFIIW3KZE&AB_CHANNEL=MOSS%C3%A9CYBERSECURITYINSTITUTE
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=_BPBQUU91-Q&AB_CHANNEL=BREAKTHESECURITY
• HTTPS://GITHUB.COM/RMUSSER01/INFOSEC_REFERENCE/BLOB/MASTER/DRAFT/PRIVESCPOSTEX.MD
• HTTPS://PENTESTLAB.BLOG/2017/08/19/COMMAND-AND-CONTROL-POWERSHELL/
• HTTPS://ENIGMA0X3.NET/2014/01/17/COMMAND-AND-CONTROL-USING-POWERSHELL-AND-YOUR-
FAVORITE-WEBSITE/
• HTTPS://WWW.SNAPLABS.IO/INSIGHTS/COMMAND-AND-CONTROL-WITH-POWERSHELL-EMPIRE-PT1
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=WVHVDUVFQNM&AB_CHANNEL=DEMMSEC
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=OH-LCN5K9K8&AB_CHANNEL=COVER6SOLUTIONS
• HTTPS://TRUNESKI.GITHUB.IO/BLOG/2017/03/03/DROPBOX-COMMAND-AND-CONTROL-OVER-
POWERSHELL-WITH-INVOKE-DBC2/
• HTTPS://WWW.COVER6SOLUTIONS.COM/WEBINAR-INTRO-TO-C2-WITH-POWERSHELL-EMPIRE/
• HTTPS://PENTESTLAB.BLOG/2019/11/05/PERSISTENCE-POWERSHELL-PROFILE/
• HTTPS://PENTESTLAB.BLOG/2019/11/04/PERSISTENCE-SCHEDULED-TASKS/
• HTTPS://GITHUB.COM/EMILYANNCR/WINDOWS-POST-EXPLOITATION
• HTTPS://ADSECURITY.ORG/?P=429
• HTTPS://BOOK.HACKTRICKS.XYZ/WINDOWS/BASIC-POWERSHELL-FOR-PENTESTERS
• HTTPS://MEDIA.BLACKHAT.COM/EU-13/BRIEFINGS/MITTAL/BH-EU-13-POWERSHELL-FOR-PENETRATION-
MITTAL-SLIDES.PDF
• HTTPS://WWW.IRED.TEAM/OFFENSIVE-SECURITY/EXFILTRATION
• HTTPS://AZERIA-LABS.COM/DATA-EXFILTRATION/
• HTTPS://WWW.HACKINGARTICLES.IN/DATA-EXFILTRATION-USING-POWERSHELL-EMPIRE/
• HTTPS://WWW.SANS.ORG/WEBCASTS/PEN-TESTING-POWERSHELL-DATA-EXFILTRATION-TECHNIQUES-108740
• HTTPS://BLOG.STACKATTACK.NET/2019/03/14/QUICK-HIT-BASE64-POWERSHELL-EXFILTRATION/
• HTTPS://NIICONSULTING.COM/CHECKMATE/2016/03/EXFILTRATION-USING-POWERSHELL-OUTLOOK/
• HTTPS://WWW.SEVENLAYERS.COM/INDEX.PHP/305-POWERSHELL-DATA-EXFIL
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=8ZAREHY5HBW
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=TBBT1C2ZJMS&AB_CHANNEL=HAK5
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=MIQVVX943FW&AB_CHANNEL=SANSPENTESTTRAINING
• HTTPS://GITHUB.COM/TOPICS/PENETRATION-TESTING?L=POWERSHELL
• HTTPS://WWW.FIREEYE.COM/CONTENT/DAM/FIREEYE-WWW/GLOBAL/EN/SOLUTIONS/PDFS/WP-LAZANCIYAN-
INVESTIGATING-POWERSHELL-ATTACKS.PDF
• HTTPS://LIVE.SYSINTERNALS.COM/
• HTTPS://GITHUB.COM/BLUSCREENOFJEFF/RED-TEAM-INFRASTRUCTURE-WIKI
• HTTPS://BLOG.HARMJ0Y.NET/
• HTTPS://ENIGMA0X3.NET/
• HTTPS://WALD0.COM/
• HTTPS://POSTS.SPECTEROPS.IO/
• HTTP://WWW.EXPLOIT-MONDAY.COM/
• HTTPS://ADSECURITY.ORG/
• HTTP://WWW.INVOKE-IR.COM/
• HTTPS://SPECTEROPS.IO/RESOURCES/RESEARCH-AND-DEVELOPMENT
• HTTPS://WWW.BLACKHAT.COM/US-16/TRAINING/ADVANCED-POWERSHELL-FOR-OFFENSIVE-
OPERATIONS.HTML
•
•
•
•
•
•