From the course: PowerShell for Security Professionals

Unlock this course with a free trial

Join today to access over 24,400 courses taught by industry experts.

Using PowerShell to exploit

Using PowerShell to exploit

Hey, everybody, welcome back to the PowerShell for Cybersecurity Professionals course. In this module, I'm going to be explaining some of the concepts you'll need to know as a member of the red team or as an attacker, to understand how you can leverage your knowledge of PowerShell in order to exploit devices on a network. For a more in-depth guide on how to perform some of these exploits, I highly recommend you check out one of Cybrary's various penetration testing courses. Those go a lot more in-depth than we will in this one. I'm just here to teach you about the small role that PowerShell plays in a lot of these methods. So, this concept of privilege escalation is what's being shown here in this diagram. Essentially, as an attacker, you want to gain access to at the very least the admin level of privileges. And you can go up to getting even root-level privileges and kernel-level privileges. The user or the person at the bottom of this diagram usually has the least amount of…

Contents