Pentesting with PowerShell

PowerShell has become extremely popular among hackers over the years. It is important and highly useful for penetration testers and ethical hackers. PowerShell is easy to learn and provides access to almost everything in Windows systems, opening up a large attack surface to execute many attack possibilities.
Here are the notes I jotted down while completing the course "Hands-On Penetration Testing with PowerShell" by EC-Council.
##List of Learning Paths
| Learning Path Name | Lecture Number | Description |
|---|---|---|
| PowerShell Introduction & Basics | 1 | Starting out by understanding the basics of Windows PowerShell. |
| PowerShell Scripting | 2 | Scripting basic programs with PowerShell. |
| Reconnaissance & Scanning | 3 | Reconnaissance using PowerShell. |
| Active Directory - Part 1 | 4 | Using PowerShell to exploit Active Directory (Part 1). |
| Active Directory - Part 2 | 5 | Using PowerShell to exploit Active Directory (Part 2). |
| PowerShell and Metasploit | 6 | Using PowerShell with Metasploit to perform exploits. |
| Backdoors, Lateral Movement, and Persistence | 7 | Basic understanding of backdoors, lateral movement, and persistence. |
Some Powershell Scripts I wrote down during this course (Educational Purpose Only!!) -
- >sum.ps1
- >backdoor.ps1
- >List_Processes.ps1
- >ExportMSOLUsers.ps1
- >Modules.ps1
- >Process_Module.ps1
- >ScheduledTasks.ps1