PowerShell for Pentesters, Part 5: Remoting With PowerShell
Introduction In part five of our series on PowerShell for pentesters, we will discuss a very important subject: the process of remoting with PowerShell. Remoting will allow us to execute PowerShell... Go on to the site to read the full article ... Read More
PowerShell for Pentesters Part 4: Modules with PowerShell
Introduction The more we advance in our lab series, the more we notice the power of PowerShell. And it will only become more noticeable. In this lab we will discover how to manipulate modules with... Go on to the site to read the full article ... Read More
PowerShell for Pentesters
Part 3: Functions and Scripting with PowerShell Introduction The more we advance in our articles, the more we notice the power of PowerShell, and that impression will only increase as we move... Go on to the site to read the full article ... Read More
PowerShell For Pentesters Part 2: The essentials of PowerShell
Introduction PowerShell represents one of the most interesting and powerful languages for a pentesting purpose as we explained in the first part of this lab series. For the first part of this series... Go on to the site to read the full article ... Read More
PowerShell For Pentesters Part 1: Introduction to PowerShell and Cmdlets
Introduction PowerShell represents one of the most interesting and powerful languages for a pentesting purpose. So, we will try to focus on this context with this suite of articles. This article... Go on to the site to read the full article ... Read More
Shodan and IoT: The Problem is here!
Introduction Shodan a search engine which collects the information about all IPv4 and IPv6 devices connected to the internet and gives us the ability to search devices using filters that can be very... Go on to the site to read the full article ... Read More