Welcome to PowerShell for Hackers! PowerShell is the most advanced and powerful framework inside Windows systems, that gives every user power and ease of use. Once it comes into the security picture, it shows the power of hacking system controls. Because PowerShell provides full access to WMI and COM, it enables us to take full control of the system, using commands in a hacking movie style. This course allows to leverage the power of PowerShell as a Hacker, and take over the systems, networks, and web servers.
PowerShell is helpful for: security researchers, ethical hackers, penetration testers, system administrators and for those who want to take complete control of the Windows systems, either in the red or blue team.
*Get ready to get hacking in the terminal*
Course duration: 18 hours (18 CPE points)Â
Course is self-paced and pre-recorded
What will you learn?
- PowerShell commands and functions
- Using PowerShell for security testing
- Scripting information and porting as exploits
- Various Windows internals
- Attacking methods
- Interacting with different Windows services
- Retrieving NTLM hashes
What skills will you gain?
- Commands and the ways to use it
- Various attacks with PowerShell
- Creating PowerShell scripts for attacks
- Hacking web servers with PowerShell scripts
- Hacking two factor authentication with PowerShell
- Porting the exploits to Metasploit for attacks
- Exfiltration
- Controlling remote systems
- Creating backdoors
- Creating webshells
- Persistent attacks
- PowerShell obfuscation
- Privilege escalation using PowerShell, and much more.
What will you need?
- Windows 7 or later versions, and internet connection
What should you know before you join?
- Basic understanding of programming and/or scripting is useful, but not necessarily required.
Your instructor:
Atul Tiwari has over 10 years in security training. He has trained more than 45k students across 162 countries in online mode. Atul has specialized in web security testing and has conducted hundreds of pentests, audits, and tests of web applications since 2013. He holds CISSP certifications with CEH, cyber laws, CCNA. Â
He is founder and CTO at gray hat | security (INDIA) www.grayhat.in
Course Syllabus
Module 1: Introduction
This introductory module will drive you through basics and useful commands, functions, objects, modules, jobs, cmdlets and syntax of PowerShell. We will see how to create powerful PowerShell scripts to port the exploits in an attack later. All will be demonstrated in an easy to understand way.
Module 1 covered topics:
- Introduction to PowerShell
- Basics of PowerShell (includes: syntax, cmdlets and system help)
- PowerShell modules
- PowerShell jobs
- Functions and pipelining
- PowerShell scripts
- Scripting with PowerShell - Creating PowerShell scripts
Module 1 exercises:
- PowerShell cmdlets
- PowerShell jobs
- Scripting
Module 2: PowerShell Hands-On
This is the time to explore what a hacker can actually do with PowerShell. Various Windows features interact with PowerShell, and can show extraordinary results to make it easy for hackers to attack in a fast-paced manner. Understanding how Windows interacts with system internals will give you power to do things in such a fashion.
Module 2 covered topics:
- PowerShell integration with .NET
- PowerShell and WMI
- WMI Explorer
- Windows API with PowerShell
- COM objects
- PowerShell to Windows Registry
Module 2 exercises:
- Interaction with the Registry
- Windows API
- COM Objects
Module 3: Attacks with PowerShell
This module starts with the exploitation of PowerShell to perform tasks ranging from information gathering to recon, from client-side attacks to brute-force attacks, DNS enum to hacking Windows system with the help of Metasploit and PowerShell scripts. Vulnerability scanning will also be done using PowerShell. Finally, we will see how one can bypass the two factor authentication using PowerShell alone.
Module 3 covered topics:
- Information gathering
- Scanning and Reconnaissance
- Client-side attacks with PowerShell
- Brute-force attack with PowerShell
- DNS Enumeration
- PowerShell scripts in Metasploit
- Hacking Windows system using HTA web server with Metasploit
- Bypassing two factor authentication (2FA) with PowerShell
Module 3 exercises:
- Information gathering
- Brute-forcing
- DNS Enum
- Porting exploits to PowerShell
Module 4: Exploitation and Post-exploitation
Complete exploitation with PowerShell. We will leverage the power of PowerShell to hack the system, get the complete system details, fetch the data, create backdoors, create webshells, and escalate privileges to the high level.
Module 4 covered topics:
- Privilege escalation with PowerShell
- Fetching system details
- Creating webshells with PowerShell
- Passing the hashes
- Retrieving NTLM hashes without LSASS
- Exfiltration mechanisms
- Remote command execution with WMI and WS-Management
- Creating backdoors with PowerShell
- Walkthrough of Nishang
- Bonus - useful commands and tricks for hackers Â
Module 4 exercises:
- Privilege escalation
- Creating webshells
- Pass-the-hash attacks
Course format:Â
- The course is self-paced – you can visit the training whenever you want and your content will be there.
- Once you’re in, you keep access forever, even when you finish the course.
- There are no deadlines, except for the ones you set for yourself.
- We designed the course so that a diligent student will need about 18 hours of work to complete the training.
- Your time will be filled with reading, videos, and exercises.Â
QUESTIONS?Â
If you have any questions, please contact our eLearning Manager at [email protected].
Reviews
There are no reviews yet.