-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
PowerShell for Penetration Testing
By :
PowerShell for Penetration Testing
By:
Overview of this book
PowerShell for Penetration Testing is a comprehensive guide designed to equip you with the essential skills you need for conducting effective penetration tests using PowerShell.
You'll start by laying a solid foundation by familiarizing yourself with the core concepts of penetration testing and PowerShell scripting. In this part, you'll get up to speed with the fundamental scripting principles and their applications across various platforms. You’ll then explore network enumeration, port scanning, exploitation of web services, databases, and more using PowerShell tools. Hands-on exercises throughout the book will solidify your understanding of concepts and techniques. Extending the scope to cloud computing environments, particularly MS Azure and AWS, this book will guide you through conducting penetration tests in cloud settings, covering governance, reconnaissance, and networking intricacies. In the final part, post-exploitation techniques, including command-and-control structures and privilege escalation using PowerShell, will be explored. This section encompasses post-exploitation activities on both Microsoft Windows and Linux systems.
By the end of this book, you’ll have covered concise explanations, real-world examples, and exercises that will help you seamlessly perform penetration testing techniques using PowerShell.
Table of Contents (23 chapters)
Preface
Part 1: Introduction to Penetration Testing and PowerShell
Chapter 1: Introduction to Penetration Testing
Chapter 2: Programming Principles in PowerShell
Part 2: Identification and Exploitation
Chapter 3: Network Services and DNS
Chapter 4: Network Enumeration and Port Scanning
Chapter 5: The WEB, REST, and SOAP
Chapter 6: SMB, Active Directory, LDAP and Kerberos
Chapter 7: Databases: MySQL, PostgreSQL, and MSSQL
Chapter 8: Email Services: Exchange, SMTP, IMAP, and POP
Chapter 9: PowerShell and FTP, SFTP, SSH, and TFTP
Chapter 10: Brute Forcing in PowerShell
Chapter 11: PowerShell and Remote Control and Administration
Part 3: Penetration Testing on Azure and AWS cloud Environments
Chapter 12: Using PowerShell in Azure
Chapter 13: Using PowerShell in AWS
Part 4: Post Exploitation and Command and Control
Chapter 14: Command and Control
Chapter 15: Post-Exploitation in Microsoft Windows
Chapter 16: Post-Exploitation in Linux
Index
Customer Reviews