In this recipe, we will use PowerShell to connect back to our Kali host. PowerShell has been included with Windows Vista and beyond and has become a very popular attack vector due to the capabilities of the shell. We will not focus on how to get the script there, as we have covered options in other recipes; this will just focus on creating the malicious payload.
PowerShell attack vector
Getting ready
Let's ensure the following prerequisites:
- Kali Linux is running, and you are logged in as root
- Move the interface of one of your Windows test machines to the NAT network temporarily