Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
PowerShell Automation and Scripting for Cybersecurity

You're reading from   PowerShell Automation and Scripting for Cybersecurity Hacking and defense for red and blue teamers

Arrow left icon
Product type Paperback
Published in Aug 2023
Publisher Packt
ISBN-13 9781800566378
Length 572 pages
Edition 1st Edition
Languages
Arrow right icon
Author (1):
Arrow left icon
Miriam C. Wiesner Miriam C. Wiesner
Author Profile Icon Miriam C. Wiesner
Miriam C. Wiesner
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Preface 1. Part 1: PowerShell Fundamentals
2. Chapter 1: Getting Started with PowerShell FREE CHAPTER 3. Chapter 2: PowerShell Scripting Fundamentals 4. Chapter 3: Exploring PowerShell Remote Management Technologies and PowerShell Remoting 5. Chapter 4: Detection – Auditing and Monitoring 6. Part 2: Digging Deeper – Identities, System Access, and Day-to-Day Security Tasks
7. Chapter 5: PowerShell Is Powerful – System and API Access 8. Chapter 6: Active Directory – Attacks and Mitigation 9. Chapter 7: Hacking the Cloud – Exploiting Azure Active Directory/Entra ID 10. Chapter 8: Red Team Tasks and Cookbook 11. Chapter 9: Blue Team Tasks and Cookbook 12. Part 3: Securing PowerShell – Effective Mitigations In Detail
13. Chapter 10: Language Modes and Just Enough Administration (JEA) 14. Chapter 11: AppLocker, Application Control, and Code Signing 15. Chapter 12: Exploring the Antimalware Scan Interface (AMSI) 16. Chapter 13: What Else? – Further Mitigations and Resources 17. Index 18. Other Books You May Enjoy

Index

As this ebook edition doesn't have fixed pagination, the page numbers below are hyperlinked for reference only, based on the printed edition of this book.

A

AADInternals 328, 342

features 343

AAD Pass-through Authentication (PTA) 297

AAD password hash synchronization 297

AAD SSO

abusing 329, 330

about_operators documentation

reference link 58

about_Profiles

reference link 354

abstraction 12

Abstract Syntax Tree (AST) 502

access control entries (ACEs) 264

access-allowed ACE 265

access-allowed object ACE 265

access-denied ACE 265

access-denied object ACE 265

access mask 264

system-audit ACE 265

system-audit object ACE 265

trustee 264

access control lists (ACLs) 253, 264, 423

access rights 263

access control list (ACL) 264

domain ACLs 269

domain trusts 271

GPO ACLs 268

OU ACLs 265

Security Identifier (SID) 263, 264

access token 301, 303

Account Operators group...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime