PowerShell - PowerShell’s Security Guiding Principles

来源:互联网 发布:淘宝机票改签流程 编辑:程序博客网 时间:2024/06/03 22:58
PS C:\Users\test\Desktop\PowerSploit-master\Exfiltration> Set-ExecutionPolicy DefaultExecution Policy ChangeThe execution policy helps protect you from scripts that you do not trust. Changing the execution policy might expose you to the security risks described in the about_Execution_Policies help topic at http://go.microsoft.com/fwlink/?LinkID=135170. Do you want to change the execution policy?[Y] Yes  [N] No  [S] Suspend  [?] Help (default is "Y"): Y
PS C:\Users\test> Import-Module cd C:\Users\test\Desktop\PowerSploit-master\Exfiltration\Invoke-Mimikatz.ps1Import-Module : A positional parameter cannot be found that accepts argument 'C:\Users\test\Desktop\PowerSploit-master\Exfiltration\Invoke-Mimikatz.ps1'.At line:1 char:1+ Import-Module cd C:\Users\test\Desktop\PowerSploit-master\Exfiltration\Invoke-Mi ...+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~    + CategoryInfo          : InvalidArgument: (:) [Import-Module], ParameterBindingException    + FullyQualifiedErrorId : PositionalParameterNotFound,Microsoft.PowerShell.Commands.ImportModuleCommand
PS C:\Users\test\Desktop\PowerSploit-master\Exfiltration> Invoke-Expression(New-Object Net.WebClient).DownloadString("file://C:\Users\test\Desktop\PowerSploit-master\Exfiltration\Invoke-Mimikatz.ps1")
PS C:\Users\test> PowerShell.exe -ExecutionPolicy Bypass -File C:\Users\test\Desktop\PowerSploit-master\Exfiltration\Invoke-Mimikatz.ps1

References

  1. Youtube - 106 PowerShell Secrets and Tactics Ben0xA
  2. https://blogs.msdn.microsoft.com/powershell/2008/09/30/powershells-security-guiding-principles/
0 0
原创粉丝点击