PowerShell Attack & Detection Techniques
Overview
Learning Workflow
Phase 1: PowerShell Foundations
PowerShell Versions & Locations
Version
Windows Version
Key Features
# Check PowerShell version
$PSVersionTable.PSVersion
$host.Version
# PowerShell locations
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe # 64-bit
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe # 32-bit
C:\Program Files\PowerShell\7\pwsh.exe # PS Core
# Force specific version (downgrade attack)
powershell.exe -Version 2 -Command "Get-Host"Execution Policies
Policy
Description
Security Controls
AMSI (Antimalware Scan Interface)
Constrained Language Mode
Script Block Logging
Transcription Logging
Important Event IDs
Event ID
Log
Description
Phase 2: Reconnaissance
Attack Techniques
Network Reconnaissance
Active Directory Reconnaissance
Service Enumeration
Detection Strategies
Log Analysis
Network Detection
Detection Script
Phase 3: Initial Access
Attack Techniques
Download Cradles
Encoded Commands
File Download Methods
Phishing Payloads
Detection Strategies
Log Indicators
Network Detection
Detection Script
Defensive Measures
Phase 4: Execution
Attack Techniques
Script Execution Methods
Fileless Execution
Alternative Execution Hosts
AMSI Bypass Techniques
Detection Strategies
Log Analysis
Process Detection
Detection Script
Phase 5: Persistence
Attack Techniques
Registry Persistence
Scheduled Tasks
WMI Event Subscriptions
Service Persistence
Startup Folder
Detection Strategies
Registry Monitoring
Scheduled Task Monitoring
WMI Subscription Detection
Detection Script
Phase 6: Privilege Escalation
Attack Techniques
UAC Bypass Methods
Token Manipulation
Service Exploitation
AlwaysInstallElevated
DLL Hijacking
Detection Strategies
UAC Bypass Detection
Token Detection
Detection Script
Phase 7: Defense Evasion
Attack Techniques
Obfuscation Methods
Logging Evasion
AMSI Bypass Techniques
Process Injection
Living Off the Land
Detection Strategies
Obfuscation Detection
Logging Evasion Detection
Detection Script
Phase 8: Credential Access
Attack Techniques
Mimikatz via PowerShell
SAM/SYSTEM Dump
LSASS Dump
Credential Harvesting
Kerberos Attacks
Detection Strategies
Credential Dumping Detection
Detection Script
Phase 9: Discovery
Attack Techniques
System Enumeration
Network Enumeration
Active Directory Enumeration
Detection Strategies
Log Analysis
Detection Script
Phase 10: Lateral Movement
Attack Techniques
PowerShell Remoting
WMI Execution
SMB Execution
DCOM Execution
Pass the Hash/Ticket
Detection Strategies
Log Analysis
Detection Script
Phase 11: Collection
Attack Techniques
Data Staging
Clipboard Capture
Keylogging
Screenshot Capture
Detection Strategies
Phase 12: Command & Control
Attack Techniques
PowerShell Reverse Shells
HTTP/HTTPS C2
DNS C2
C2 Frameworks (PowerShell agents)
Detection Strategies
C2 Detection Script
Phase 13: Exfiltration
Attack Techniques
HTTP/HTTPS Exfiltration
DNS Exfiltration
Cloud Exfiltration
Email Exfiltration
Detection Strategies
Exfiltration Detection Script
Comprehensive Detection Script
Quick Reference Card
Common Attack Patterns
Technique
Command Pattern
Detection
Critical Event IDs
Event ID
Log
Description
Defensive Controls
MITRE ATT&CK Mapping
Tactic
Technique
PowerShell Usage
Last updated