Post-exploitation with PowerShell
PowerShell is a full Windows administration framework, and it’s built into the operating system. It can’t be completely blocked. When we talk about post-exploitation in Windows environments, consideration of PowerShell is not a nice-to-have – it’s a necessity. We’ll examine the post phase in more detail in the last two chapters of this book, but for now, let’s introduce PowerShell’s role in bringing our attack to the next stage and one step closer to total compromise.
ICMP enumeration from a pivot point with PowerShell
So, you have your foothold on a Windows 7 or 10 box. Setting aside the possibility of uploading our tools, can we use a plain off-the-shelf copy of Windows 7 or 10 to poke around for a potential next stepping stone? With PowerShell, there isn’t much we can’t do.
As we mentioned earlier, we can pipe a number range into ForEach
. So, if we’re on a network with...