From the course: PowerShell for Security Professionals
Unlock this course with a free trial
Join today to access over 24,400 courses taught by industry experts.
Using PowerShell to exploit - PowerShell Tutorial
From the course: PowerShell for Security Professionals
Using PowerShell to exploit
Hey, everybody, welcome back to the PowerShell for Cybersecurity Professionals course. In this module, I'm going to be explaining some of the concepts you'll need to know as a member of the red team or as an attacker, to understand how you can leverage your knowledge of PowerShell in order to exploit devices on a network. For a more in-depth guide on how to perform some of these exploits, I highly recommend you check out one of Cybrary's various penetration testing courses. Those go a lot more in-depth than we will in this one. I'm just here to teach you about the small role that PowerShell plays in a lot of these methods. So, this concept of privilege escalation is what's being shown here in this diagram. Essentially, as an attacker, you want to gain access to at the very least the admin level of privileges. And you can go up to getting even root-level privileges and kernel-level privileges. The user or the person at the bottom of this diagram usually has the least amount of…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.