What this book covers
Chapter 1, Introduction to Penetration Testing, explains a penetration test and its various components.
Chapter 2, Programming Principles in PowerShell, introduces the principles of PowerShell as they relate to penetration testing.
Chapter 3, Network Services and DNS, explores the concepts of using PowerShell to profile network services and DNS using a set of worked examples.
Chapter 4, Network Enumeration and Port Scanning, discusses using PowerShell for network enumeration and profiling and then re-enforces this learning through structured examples.
Chapter 5, The WEB, REST, and SOAP, explores concepts relating to how PowerShell can be used as part of a penetration test against web applications and web services using REST and SOAP. The learning associated with each concept is reinforced via a set of staged practical examples.
Chapter 6, SMB, Active Directory, LDAP, and Kerberos, introduces the concepts and tools within PowerShell that can be used to test SMB, Active Directory, LDAP, and Kerberos applications. Issues and concepts are discussed via practical examples.
Chapter 7, Databases: MySQL, PostgreSQL, and MSSQL, focuses on how PowerShell interfaces into databases and can be used as part of a security assessment.
Chapter 8, Email Services: Exchange, SMTP, IMAP, and POP, introduces how PowerShell can assess the security posture of email services.
Chapter 9, PowerShell and FTP, SFTP, SSH, and TFTP, explores the concepts of testing FTP, SFTP, SSH, and TFTP using PowerShell.
Chapter 10, Brute Forcing in PowerShell, shows how PowerShell can perform brute-forcing authentication for various network services.
Chapter 11, PowerShell and Remote Control and Administration, shows how to use PowerShell for remote administration and management.
Chapter 12, Using PowerShell in Azure, introduces the concept of using PowerShell to perform a penetration test against an Azure-based infrastructure.
Chapter 13, Using PowerShell in AWS, explores how to perform penetration tests against an AWS infrastructure.
Chapter 14, Command and Control, introduces how PowerShell can form part of a Command and Control infrastructure for post-exploitation and lateral movement activities within a penetration test.
Chapter 15, Post-Exploitation in Microsoft Windows, explores how to use PowerShell in the post-exploitation process within a Microsoft Windows environment. Each concept is explored via a set of practical examples.
Chapter 16, Post-Exploitation in Linux, shows how to use PowerShell as part of the post-exploitation process within Linux. Each concept is elucidated through a series of practical examples.