Leverage PowerShell Tools for Pen Testing
This course will teach you to leverage one of the most powerful built-in tools, PowerShell, for penetration testing.
What you'll learn
Penetration testing is an essential task to ensure up-to-date security for your business. In this course, Leverage PowerShell Tools for Pen Testing, you’ll learn to effectively leverage PowerShell tools during a penetration test. First, you’ll explore situational awareness involving recon on a target environment. Here you will explore ways that you can execute PowerShell commands in memory and some of the tools from PowerSploit. Next, you’ll discover how to use the modules of Empire to further expand your grasp into the target network. Finally, you’ll learn how to work with PowerUpSQL to leverage PowerShell to obtain data from a SQL database. As an added bonus, you will cover some extremely useful tools to create PowerShell download cradles and obfuscate your PowerShell commands. When you’re finished with this course, you’ll have the skills and knowledge of leveraging PowerShell tools to enhance your pentesting skills.
Table of contents
- Module Introduction 1m
- Using Onedrive for C2 Communication 3m
- Creating a WMI Stager 3m
- Introducing Starkiller 6m
- Performing Recon with Empire - Part 1 4m
- Performing Recon with Empire - Part 2 4m
- Using PowerUp in Empire to Check for Privilege Escalation 4m
- Dumping Credentials with Empire 3m
- Lateral Movement with Empire 5m
- Module Summary 1m