PowerShell for Practical Purple Teaming

Hacker
May. 2, 2017
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
1 of 46

More Related Content

What's hot

Red Team Methodology - A Naked LookRed Team Methodology - A Naked Look
Red Team Methodology - A Naked LookJason Lang
Evading Microsoft ATA for Active Directory DominationEvading Microsoft ATA for Active Directory Domination
Evading Microsoft ATA for Active Directory DominationNikhil Mittal
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE - ATT&CKcon
Adversary Emulation WorkshopAdversary Emulation Workshop
Adversary Emulation Workshopprithaaash
Purple Team - Work it out: Organizing Effective Adversary Emulation ExercisesPurple Team - Work it out: Organizing Effective Adversary Emulation Exercises
Purple Team - Work it out: Organizing Effective Adversary Emulation ExercisesJorge Orchilles
PHDays 2018 Threat Hunting Hands-On LabPHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On LabTeymur Kheirkhabarov

Similar to PowerShell for Practical Purple Teaming

The Dirty Little Secrets They Didn’t Teach You In Pentesting Class The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class Chris Gates
Powerpreter: Post Exploitation like a BossPowerpreter: Post Exploitation like a Boss
Powerpreter: Post Exploitation like a BossNikhil Mittal
01 Metasploit kung fu introduction01 Metasploit kung fu introduction
01 Metasploit kung fu introductionMostafa Abdel-sallam
2018 Writing Offensive .Net Tools2018 Writing Offensive .Net Tools
2018 Writing Offensive .Net ToolsAlexander Polce Leary
Forging Trusts for Deception in Active DirectoryForging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active DirectoryNikhil Mittal
PowerShell - Be A Cool Blue KidPowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidMatthew Johnson

Similar to PowerShell for Practical Purple Teaming(20)

More from Nikhil Mittal

0wn-premises: Bypassing Microsoft Defender for Identity0wn-premises: Bypassing Microsoft Defender for Identity
0wn-premises: Bypassing Microsoft Defender for IdentityNikhil Mittal
RACE - Minimal Rights and ACE for Active Directory DominanceRACE - Minimal Rights and ACE for Active Directory Dominance
RACE - Minimal Rights and ACE for Active Directory DominanceNikhil Mittal
Workshop: PowerShell for Penetration TestersWorkshop: PowerShell for Penetration Testers
Workshop: PowerShell for Penetration TestersNikhil Mittal
Continuous intrusion: Why CI tools are an attacker’s best friendsContinuous intrusion: Why CI tools are an attacker’s best friends
Continuous intrusion: Why CI tools are an attacker’s best friendsNikhil Mittal
Client side attacks using PowerShellClient side attacks using PowerShell
Client side attacks using PowerShellNikhil Mittal
PowerShell for Penetration TestersPowerShell for Penetration Testers
PowerShell for Penetration TestersNikhil Mittal

Recently uploaded

Product Research Presentation-Maidy Veloso.pptxProduct Research Presentation-Maidy Veloso.pptx
Product Research Presentation-Maidy Veloso.pptxMaidyVeloso
Product Research Presentation-Maidy Veloso.pptxProduct Research Presentation-Maidy Veloso.pptx
Product Research Presentation-Maidy Veloso.pptxMaidyVeloso
Privacy in the era of quantum computersPrivacy in the era of quantum computers
Privacy in the era of quantum computersSpeck&Tech
V3Cube Gojek Clone - Rebrand With SuperiorityV3Cube Gojek Clone - Rebrand With Superiority
V3Cube Gojek Clone - Rebrand With SuperiorityV3cube
UiPath Tips and Techniques for Debugging - Session 3UiPath Tips and Techniques for Debugging - Session 3
UiPath Tips and Techniques for Debugging - Session 3DianaGray10
Accelerating Data Science through Feature Platform, Transformers and GenAIAccelerating Data Science through Feature Platform, Transformers and GenAI
Accelerating Data Science through Feature Platform, Transformers and GenAIFeatureByte

Recently uploaded(20)

PowerShell for Practical Purple Teaming