Summary
In summary, within this chapter, we have explored how PowerShell can be used to perform a vulnerability assessment against mail servers. With worked examples, we have shown how port scanning, authentication, brute-forcing, and banner grabbing can be part of a vulnerability assessment.
In the next chapter, we will learn how to use PowerShell as part of a penetration test against file-sharing services and remote access services.