The PowerShell for Pentesters it is an intreatment on using PowerShell in pentesters. A series of videos that break down all the techniques that security analysts can apply and understand how Powershell works.
Scripts are provided to easily install Active Directory functionality, however, no instructions are given for installing virtual machines. A guide provided in this repo describes the basics of setting up your network in Virtualbox.
The process is similar in VMWare Workstation and Workstation Pro.
Finally you will need Hashcat, which is available at https://hashcat.net/hashcat/. You can also download it via Kali Linux if you have it installed.
Installation
git clone https://github.com/dievus/PowerShellForPentesters.git
Specifications
- User, group, and workstation enumeration
- Domain enumeration
- Downloading with PowerShell
- Group Policy Enumeration
- ACL Enumeration
- PowerShell Remoting
- PowerView and other popular offensive PowerShell scripts
- Mimikatz exploitation
Use
- Invoke-ForestDeploy.ps1
The . \ Invoke-ADGenerator.ps1
Invoke -ADGenerator -DomainName
This will install the Windows Active Directory Domain Services toolset and create the actual domain. Follow the on-screen instructions, noting the domain name that usestai as this will be needed later.
- Invoke-ADGenerator.ps1
The . \ Invoke-ADGenerator.ps1
Invoke -ADGenerator -DomainName
This will create the appropriate users, groups, permissions and configurations required for the course.
- NameGen.ps1
The . \ NameGen.ps1
executeScript -ComputerName Workstation -01
This runs on the Workstation-01 machine created to properly name the workstation. Be sure to use -ComputerName flag and specify Workstation -01.
You can find the course on YouTube by clicking here.