Powershell can be used for both legitimate and malicious purposes. It leaves various artifacts that can be used for forensic analysis, including entries in the registry, network traffic, memory artifacts, prefetch files, and Windows event logs. The document discusses how Powershell can be used by attackers to remain undetected by bypassing execution policies, using obfuscation techniques, and leveraging living off the land tactics that blend in with normal Windows processes and activities. It provides examples of open-source Powershell toolkits and outlines forensic artifacts left by Powershell activity.
3. >_ Powershell
• Microsoft tarafından Windows komut satırı cmd.exe ve Windows
Script Host'a alternatif olarak geliştirilen yeni nesil bir komut satırı
uygulamasıdır.