search
0
cart
close
You have no products in your basket yet
left
Tech Categories
Best Sellers
New Releases
Books
Videos
Audiobooks
Articles
Newsletters
Free Learning
right
PowerShell Automation and Scripting for Cybersecurity

PowerShell Automation and Scripting for Cybersecurity: Hacking and defense for red and blue teamers

By Miriam C. Wiesner
$39.99 $27.98
Book Aug 2023 572 pages 1st Edition
eBook
$39.99 $27.98
Print
$49.99
Subscription
$15.99 Monthly
eBook
$39.99 $27.98
Print
$49.99
Subscription
$15.99 Monthly

What do you get with eBook?

Feature icon Instant access to your Digital eBook purchase
Feature icon Download this book in EPUB and PDF formats
Feature icon Access this title in our online reader with advanced features
Feature icon DRM FREE - Read whenever, wherever and however you want
Buy Now

Product Details


Publication date : Aug 16, 2023
Length 572 pages
Edition : 1st Edition
Language : English
ISBN-13 : 9781800566378
Vendor :
Microsoft
toc View table of contents toc Preview Book toc Download Code

Key benefits

  • Master PowerShell for security by configuring, auditing, monitoring, exploiting, and bypassing defenses
  • Research and develop methods to bypass security features and use stealthy tradecraft
  • Explore essential security features in PowerShell and protect your environment against exploits and bypasses

Description

Take your cybersecurity skills to the next level with this comprehensive guide to PowerShell security! Whether you’re a red or blue teamer, you’ll gain a deep understanding of PowerShell’s security capabilities and how to use them. After revisiting PowerShell basics and scripting fundamentals, you’ll dive into PowerShell Remoting and remote management technologies. You’ll learn how to configure and analyze Windows event logs and understand the most important event logs and IDs to monitor your environment. You’ll dig deeper into PowerShell’s capabilities to interact with the underlying system, Active Directory and Azure AD. Additionally, you’ll explore Windows internals including APIs and WMI, and how to run PowerShell without powershell.exe. You’ll uncover authentication protocols, enumeration, credential theft, and exploitation, to help mitigate risks in your environment, along with a red and blue team cookbook for day-to-day security tasks. Finally, you’ll delve into mitigations, including Just Enough Administration, AMSI, application control, and code signing, with a focus on configuration, risks, exploitation, bypasses, and best practices. By the end of this book, you’ll have a deep understanding of how to employ PowerShell from both a red and blue team perspective.

What you will learn

Leverage PowerShell, its mitigation techniques, and detect attacks Fortify your environment and systems against threats Get unique insights into event logs and IDs in relation to PowerShell and detect attacks Configure PSRemoting and learn about risks, bypasses, and best practices Use PowerShell for system access, exploitation, and hijacking Red and blue team introduction to Active Directory and Azure AD security Discover PowerShell security measures for attacks that go deeper than simple commands Explore JEA to restrict what commands can be executed

What do you get with eBook?

Feature icon Instant access to your Digital eBook purchase
Feature icon Download this book in EPUB and PDF formats
Feature icon Access this title in our online reader with advanced features
Feature icon DRM FREE - Read whenever, wherever and however you want
Buy Now

Product Details


Publication date : Aug 16, 2023
Length 572 pages
Edition : 1st Edition
Language : English
ISBN-13 : 9781800566378
Vendor :
Microsoft

Table of Contents

19 Chapters
Preface Packt Packt
Preface
Who this book is for
What this book covers
To get the most out of this book
Download the example code files
Conventions used
Get in touch
Share Your Thoughts
Part 1: PowerShell Fundamentals Packt Packt
Part 1: PowerShell Fundamentals
Chapter 1: Getting Started with PowerShell Packt Packt
Chapter 1: Getting Started with PowerShell
Technical requirements
What is PowerShell?
Getting started with PowerShell
Summary
Further reading
Chapter 2: PowerShell Scripting Fundamentals Packt Packt
Chapter 2: PowerShell Scripting Fundamentals
Technical requirements
Variables
Operators
Control structures
Naming conventions
PowerShell profiles
Understanding PSDrives in PowerShell
Making your code reusable
Summary
Further reading
Chapter 3: Exploring PowerShell Remote Management Technologies and PowerShell Remoting Packt Packt
Chapter 3: Exploring PowerShell Remote Management Technologies and PowerShell Remoting
Technical requirements
Working remotely with PowerShell
Enabling PowerShell remoting
PowerShell endpoints (session configurations)
PowerShell remoting authentication and security considerations
Executing commands using PowerShell remoting
Best practices
Summary
Further reading
Chapter 4: Detection – Auditing and Monitoring Packt Packt
Chapter 4: Detection – Auditing and Monitoring
Technical requirements
Configuring PowerShell Event Logging
Analyzing event logs
Getting started with logging
Summary
Further reading
Part 2: Digging Deeper – Identities, System Access, and Day-to-Day Security Tasks Packt Packt
Part 2: Digging Deeper – Identities, System Access, and Day-to-Day Security Tasks
Chapter 5: PowerShell Is Powerful – System and API Access Packt Packt
Chapter 5: PowerShell Is Powerful – System and API Access
Technical requirements
Getting familiar with the Windows Registry
User rights
Basics of the Windows API
Exploring .NET Framework
Understanding the Component Object Model (COM) and COM hijacking
Common Information Model (CIM)/WMI
Running PowerShell without powershell.exe
Summary
Further reading
Chapter 6: Active Directory – Attacks and Mitigation Packt Packt
Chapter 6: Active Directory – Attacks and Mitigation
Technical requirements
Introduction to Active Directory from a security point of view
How attacks work in a corporate environment
ADSI, ADSI accelerators, LDAP, and the System.DirectoryServices namespace
Enumeration
Enumerating GPOs
Enumerating groups
Privileged accounts and groups
Password spraying
Access rights
Credential theft
Mitigation
Microsoft baselines and the security compliance toolkit
Summary
Further reading
Chapter 7: Hacking the Cloud – Exploiting Azure Active Directory/Entra ID Packt Packt
Chapter 7: Hacking the Cloud – Exploiting Azure Active Directory/Entra ID
Technical requirements
Differentiating between AD and AAD
Authentication in AAD
Privileged accounts and roles
Accessing AAD using PowerShell
Attacking AAD
Credential theft
Mitigations
Summary
Further reading
Chapter 8: Red Team Tasks and Cookbook Packt Packt
Chapter 8: Red Team Tasks and Cookbook
Technical requirements
Phases of an attack
Common PowerShell red team tools
Red team cookbook
Summary
Further reading
Chapter 9: Blue Team Tasks and Cookbook Packt Packt
Chapter 9: Blue Team Tasks and Cookbook
Technical requirements
Protect, detect, and respond
Common PowerShell blue team tools
Blue team cookbook
Summary
Further reading
Part 3: Securing PowerShell – Effective Mitigations In Detail Packt Packt
Part 3: Securing PowerShell – Effective Mitigations In Detail
Chapter 10: Language Modes and Just Enough Administration (JEA) Packt Packt
Chapter 10: Language Modes and Just Enough Administration (JEA)
Technical requirements
What are language modes within PowerShell?
Understanding JEA
Simplifying your deployment using JEAnalyzer
Logging within JEA sessions
Best practices – avoiding risks and possible bypasses
Summary
Further reading
Chapter 11: AppLocker, Application Control, and Code Signing Packt Packt
Chapter 11: AppLocker, Application Control, and Code Signing
Technical requirements
Preventing unauthorized script execution with code signing
Controlling applications and scripts
Getting familiar with Microsoft AppLocker
Exploring Windows Defender Application Control
How does PowerShell change when application control is enforced?
Further reading
Chapter 12: Exploring the Antimalware Scan Interface (AMSI) Packt Packt
Chapter 12: Exploring the Antimalware Scan Interface (AMSI)
Technical requirements
What is AMSI and how does it work?
Why AMSI? A practical example
Bypassing AMSI
Summary
Further reading
Chapter 13: What Else? – Further Mitigations and Resources Packt Packt
Chapter 13: What Else? – Further Mitigations and Resources
Technical requirements
Secure scripting
Exploring Desired State Configuration
Hardening systems and environments
Attack detection – Endpoint Detection and Response
Summary
Further reading
Index Packt Packt
Index
Why subscribe?
Other Books You May Enjoy Packt Packt
Other Books You May Enjoy
Packt is searching for authors like you
Share Your Thoughts
Download a free PDF copy of this book

Customer reviews

filter Filter
Rating distribution
star-icon star-icon star-icon star-icon star-icon 5
(1 Ratings)
5 star 100%
4 star 0%
3 star 0%
2 star 0%
1 star 0%
N/A Feb 21, 2024
star-icon star-icon star-icon star-icon star-icon 5
Pubblicazioni interessanti scritti con il giusto livello tecnico ma soprattutto chiaro.
Feefo Verified review Feefo image
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQS

How do I buy and download an eBook? Packt Packt

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Packt Packt

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Packt Packt
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Packt Packt

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Packt Packt
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Packt Packt

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.