15
Post-Exploitation in Microsoft Windows
In this chapter, we delve into the powerful realm of post-exploitation using PowerShell in the Microsoft Windows environment. Post-exploitation is a critical phase where adversaries aim to maintain control, escalate privileges, and extract valuable information after breaching a system. Harnessing the robust capabilities of PowerShell, we explore advanced techniques for navigating Windows networks, manipulating permissions, and concealing activities. From privilege escalation and lateral movement to data exfiltration and covering tracks, PowerShell serves as a versatile toolset for both defenders and attackers. Join us as we unravel the intricacies of post-exploitation, demonstrating how PowerShell scripts ...
Get PowerShell for Penetration Testing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.