Powershell Basic Training Workflow
PowerShell for Security & Development: Training Workflow Cheatsheet
Legend & Best Practices
# Common Bypass Methods powershell.exe -ExecutionPolicy Bypass -File .\script.ps1 powershell.exe -EP Bypass -Command "Get-Process" Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope Process -Force
Phase 1: Reconnaissance & Enumeration
System Information
Network Configuration
User & Domain Information
Process & Service Enumeration
Phase 2: Credential Access & Harvesting
Stored Credentials
In-Memory Credentials (Mimikatz)
File System & Registry Searches
Phase 3: Execution & Lateral Movement
Local Execution
Remote Execution
Persistence Mechanisms
Phase 4: Privilege Escalation
Token Manipulation
Service Abuse
UAC Bypass
Phase 5: Defence Evasion & Obfuscation
AMSI & Defender Bypass
Command & String Obfuscation
File & Memory Evasion
Phase 6: Command & Control (C2)
Reverse Shells
Encrypted & Resilient C2
Phase 7: Discovery & Pillaging
File System Monitoring
Network Sniffing
Data Exfiltration
Appendix: Advanced Techniques
PowerShell & .NET Integration
Windows API Calls via P/Invoke
Low-Level System Interaction (NtObjectManager Module)
Quick-Reference Command Index
Last updated