Главная
Study mode:
on
1
Intro
2
Ignore InfoSec Hipsters
3
PowerShell is for hackers
4
Gaining Popularity
5
Why learn PowerShell?
6
PowerShell Malware
7
Blue is the new black
8
Not just a shell
9
Examples of cmdlets (discovery)
10
Examples of cmdlets (tasks)
11
Examples of cmdlets (format)
12
Examples of cmdlets (output)
13
PowerShell Providers
14
Scripting Language
15
Objects vs Strings
16
Variables
17
Arrays
18
Operators
19
Conditional Logic
20
Looping Logic
21
Net and COM
22
Net Example
23
COM Example
24
C# Wrapper
25
The Power of the Pipeline
26
Integrated Scripting Environment
27
Execution Policy
28
How Hackers Use PowerShell
29
PowerShell Golf
30
Playing Golf (continued)
31
Staged Approach
32
Base64 Encoding Trick
33
Execute
34
PowerShell and Exploitation
35
PowerShell and Phishing
36
Post-Exploitation
37
Incident Response
38
Detect Persistence
39
Defense
40
Searching for MSF's PsExec
41
Learn More Books
42
Questions?
Description:
Explore the potential of PowerShell for cybersecurity professionals in this comprehensive conference talk from ShowMeCon. Delve into PowerShell's growing popularity among hackers, its versatility as more than just a shell, and its powerful cmdlets for discovery, task execution, formatting, and output. Examine PowerShell providers, scripting language features, and the use of objects, variables, arrays, and logic structures. Learn about PowerShell's integration with .NET and COM, and discover how to leverage the Integrated Scripting Environment. Investigate how hackers utilize PowerShell, including techniques like PowerShell Golf and staged approaches. Gain insights into PowerShell's role in exploitation, phishing, and post-exploitation scenarios, as well as its implications for incident response and defense. Conclude with resources for further learning and a Q&A session to deepen your understanding of this powerful post-exploitation language.

Powershell and You - Using Microsoft's Post Exploitation Language

Add to list