3 posts tagged with "PowerShell (PSH)"
View All TagsTHM | Weaponization

Red Teaming | Weaponization | Summary:
The room focuses on alternative scripting techniques used by red teamers to execute payloads in a Windows environment.
Since many organizations restrict or monitor the execution of
.exefiles, this room explores other methods, including Windows Script Host, HTML Applications, Visual Basic Applications, and PowerShell.
The goal is to learn and practice these techniques, which are commonly used by attackers to bypass security controls and execute malicious code.
HTB | Archetype

HTB | Archetype | Summary:
This article guides users through completing the Archetype machine challenge on Hack The Box. We exploit vulnerabilities on a Microsoft SQL Server by enumerating SMB shares, finding clear text credentials, and using Impacket to authenticate and gain an authorized connection. We then escalate privileges and download Netcat to establish a reverse shell, grab the user flag, and eventually use Impacket's psexec tool to gain admin access and retrieve the root flag before terminating the connection.
Machine Name: Archetype | Difficulty: Easy | OS: Windows
