Offensive Powershell
powershell notes
start invishell with AD libs
PowerShell and AD
PS-Remoting
- uses winrm in the background
- Port 5985, 5986
- enabled by default on windows servers, needs to be enabled on client machines
- also look into
WSMan-WinRM
- kerberos credentials are not forwarded (double-hop problem)
- enable credssp to store the credentials
powershell detections
- system-wide transcripts
- script blocking logging
- AMSI (AntiMalware Scan Interface)
- Constrained Language Mode (CLM)
Can use Invisi-Shell to bypass much of that: RunWithRegistryNonAdmin.bat
execution policy
download cradles
AMSI bypass in powershell