Book Image

Learn PowerShell Core 6.0

By : David das Neves, Jan-Hendrik Peters
Book Image

Learn PowerShell Core 6.0

By: David das Neves, Jan-Hendrik Peters

Overview of this book

Beginning with an overview of the different versions of PowerShell, Learn PowerShell Core 6.0 introduces you to VSCode and then dives into helping you understand the basic techniques in PowerShell scripting. You will cover advanced coding techniques, learn how to write reusable code as well as store and load data with PowerShell. This book will help you understand PowerShell security and Just Enough Administration, enabling you to create your own PowerShell repository. The last set of chapters will guide you in setting up, configuring, and working with Release Pipelines in VSCode and VSTS, and help you understand PowerShell DSC. In addition to this, you will learn how to use PowerShell with Windows, Azure, Microsoft Online Services, SCCM, and SQL Server. The final chapter will provide you with some use cases and pro tips. By the end of this book, you will be able to create professional reusable code using security insight and knowledge of working with PowerShell Core 6.0 and its most important capabilities.
Table of Contents (26 chapters)
Title Page
Dedication
Packt Upsell
Contributors
Preface
Index

The community


We have a big community out there on GitHub, which is creating a lot of PowerShell automation modules, but also many pentesting frameworks. In this context, we very often use the specifications red teams and blue teams. Red teams consist of attackers, who try to find and make use of weaknesses in the environment. There is, though, a small difference between pentesters and red teams, as pentesters try to find as many vulnerabilities as possible in a specified time frame. To accomplish this, they use automated tools to retrieve information and find vulnerabilities. As these attacks are very often distributed from external partners, they also don't have any problem alerting the blue teams by any means, as long as this does not hinder them in finding further vulnerabilities. Red teams, in comparison, run real world adversaries and are just focused on retrieving their goal, which in most cases lies in capturing domain admin rights. 

They may use custom malware and tools and always...