[Quick Notes] Powersploit – AV Evasion
On my pentest engagements, I primarily use Powershell (PS) & PS based exploitation tools & frameworks like CME, Empire, Powersploit, Nishang, Veil, etc, along with Metasploit & other tools.
This short writeup is one of the AV evasion scenarios. Posting here for reference.
To start with, a vulnerability is a weakness in the target system which creates a security risk – …
1. TCP SYN sent
TCP SYN / ACK received
Reading up on Nmap. Thought of sharing this quick post.
Nmap probes a target before scanning it for open ports and services. Nmap address probing works as follows:-
For root / administrator users