Further reading
If you want to explore some of the topics that were mentioned in this chapter, take a look at these resources:
Abusing WMI to build a persistent asynchronous and fileless backdoor:
- https://www.blackhat.com/docs/us-15/materials/us-15-Graeber-Abusing-Windows-Management-Instrumentation-WMI-To-Build-A-Persistent%20Asynchronous-And-Fileless-Backdoor-wp.pdf
- https://www.blackhat.com/docs/us-15/materials/us-15-Graeber-Abusing-Windows-Management-Instrumentation-WMI-To-Build-A-Persistent%20Asynchronous-And-Fileless-Backdoor.pdf
New-GPLink:
- https://learn.microsoft.com/en-us/powershell/module/grouppolicy/new-gplink
PowerUpSQL:
- https://github.com/NetSPI/PowerUpSQL/wiki/PowerUpSQL-Cheat-Sheet
- https://github.com/NetSPI/PowerUpSQL/wiki
You can find all the links mentioned in this chapter in the GitHub repository for Chapter 8 – there’s no need to manually type in every link: https://github.com/PacktPublishing/PowerShell...