PowerShell for Hackers (W41)


46 items sold

Out of stock

Product Description

The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription

Welcome to PowerShell for Hackers! PowerShell is the most advanced and powerful framework inside Windows systems, that gives every user power and ease of use. Once it comes into the security picture, it shows the power of hacking system controls. Because PowerShell provides full access to WMI and COM, it enables us to take full control of the system, using commands in a hacking movie style. This course allows to leverage the power of PowerShell as a Hacker, and take over the systems, networks, and web servers.

PowerShell is helpful for: security researchers, ethical hackers, penetration testers, system administrators and for those who want to take complete control of the Windows systems, either in the red or blue team.

*Get ready to get hacking in the terminal*

Course duration: 18 hours (18 CPE points) 

Course is self-paced and pre-recorded

What will you learn?

  • PowerShell commands and functions
  • Using PowerShell for security testing
  • Scripting information and porting as exploits
  • Various Windows internals
  • Attacking methods
  • Interacting with different Windows services
  • Retrieving NTLM hashes

What skills will you gain?

  • Commands and the ways to use it
  • Various attacks with PowerShell
  • Creating PowerShell scripts for attacks
  • Hacking web servers with PowerShell scripts
  • Hacking two factor authentication with PowerShell
  • Porting the exploits to Metasploit for attacks
  • Exfiltration
  • Controlling remote systems
  • Creating backdoors
  • Creating webshells
  • Persistent attacks
  • PowerShell obfuscation
  • Privilege escalation using PowerShell, and much more.

What will you need?

  • Windows 7 or later versions, and internet connection

What should you know before you join?

  • Basic understanding of programming and/or scripting is useful, but not necessarily required.

Your instructor:

Atul Tiwari has over 10 years in security training. He has trained more than 45k students across 162 countries in online mode. Atul has specialized in web security testing and has conducted hundreds of pentests, audits, and tests of web applications since 2013. He holds CISSP certifications with CEH, cyber laws, CCNA.  

He is founder and CTO at gray hat | security (INDIA) www.grayhat.in

Course Syllabus

Module 1: Introduction

This introductory module will drive you through basics and useful commands, functions, objects, modules, jobs, cmdlets and syntax of PowerShell. We will see how to create powerful PowerShell scripts to port the exploits in an attack later. All will be demonstrated in an easy to understand way.

Module 1 covered topics:

  • Introduction to PowerShell
  • Basics of PowerShell (includes: syntax, cmdlets and system help)
  • PowerShell modules
  • PowerShell jobs
  • Functions and pipelining
  • PowerShell scripts
  • Scripting with PowerShell - Creating PowerShell scripts

Module 1 exercises:

  • PowerShell cmdlets
  • PowerShell jobs
  • Scripting

Module 2: PowerShell Hands-On

This is the time to explore what a hacker can actually do with PowerShell. Various Windows features interact with PowerShell, and can show extraordinary results to make it easy for hackers to attack in a fast-paced manner. Understanding how Windows interacts with system internals will give you power to do things in such a fashion.

Module 2 covered topics:

  • PowerShell integration with .NET
  • PowerShell and WMI
  • WMI Explorer
  • Windows API with PowerShell
  • COM objects
  • PowerShell to Windows Registry

Module 2 exercises:

  • Interaction with the Registry
  • Windows API
  • COM Objects

Module 3: Attacks with PowerShell

This module starts with the exploitation of PowerShell to perform tasks ranging from information gathering to recon, from client-side attacks to brute-force attacks, DNS enum to hacking Windows system with the help of Metasploit and PowerShell scripts. Vulnerability scanning will also be done using PowerShell. Finally, we will see how one can bypass the two factor authentication using PowerShell alone.

Module 3 covered topics:

  • Information gathering
  • Scanning and Reconnaissance
  • Client-side attacks with PowerShell
  • Brute-force attack with PowerShell
  • DNS Enumeration
  • PowerShell scripts in Metasploit
  • Hacking Windows system using HTA web server with Metasploit
  • Bypassing two factor authentication (2FA) with PowerShell

Module 3 exercises:

  • Information gathering
  • Brute-forcing
  • DNS Enum
  • Porting exploits to PowerShell

Module 4: Exploitation and Post-exploitation

Complete exploitation with PowerShell. We will leverage the power of PowerShell to hack the system, get the complete system details, fetch the data, create backdoors, create webshells, and escalate privileges to the high level.

Module 4 covered topics:

  • Privilege escalation with PowerShell
  • Fetching system details
  • Creating webshells with PowerShell
  • Passing the hashes
  • Retrieving NTLM hashes without LSASS
  • Exfiltration mechanisms
  • Remote command execution with WMI and WS-Management
  • Creating backdoors with PowerShell
  • Walkthrough of Nishang
  • Bonus - useful commands and tricks for hackers  

Module 4 exercises:

  • Privilege escalation
  • Creating webshells
  • Pass-the-hash attacks

Course format: 

  • The course is self-paced – you can visit the training whenever you want and your content will be there.
  • Once you’re in, you keep access forever, even when you finish the course.
  • There are no deadlines, except for the ones you set for yourself.
  • We designed the course so that a diligent student will need about 18 hours of work to complete the training.
  • Your time will be filled with reading, videos, and exercises. 


If you have any questions, please contact our eLearning Manager at [email protected].


There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Brute-force attacks with PowerShell

2FA Bypass With PowerShell

You may also like…

  • The Power of Scapy

    23 items sold
    Read more
  • Programming and Exploitation: Top Hakin9 Tutorials

    17 items sold
    Add to cart
  • Programming for Hackers

    52 items sold
    Add to cart
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.