Show simple item record

dc.contributor.advisorΝταντογιάν, Χριστόφορος
dc.contributor.authorPapagiannaros, Georgios
dc.contributor.authorΠαπαγιάνναρος, Γεώργιος
dc.date.accessioned2018-01-15T13:05:01Z
dc.date.available2018-01-15T13:05:01Z
dc.date.issued2016
dc.identifier.urihttp://dione.lib.unipi.gr/xmlui/handle/unipi/10545
dc.format.extent93el
dc.language.isoenel
dc.publisherΠανεπιστήμιο Πειραιώςel
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Διεθνές*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.titleA study of penetration testing procedures using Windows PowerShell: introduction to offensive PowerShell & assesment of PowerShell security toolsel
dc.typeMaster Thesisel
dc.contributor.departmentΣχολή Τεχνολογιών Πληροφορικής και Επικοινωνιών. Τμήμα Ψηφιακών Συστημάτωνel
dc.description.abstractENThis project is an attempt to approach penetration testing with PowerShell tools. Since PowerShell is at the time being over ten years old, it has ended up being a modern, quite effective but also quite complex management command line interface able to manage not only Windows systems, but any system supporting .NET framework. The mindset behind this project is to quickly present all basic components of PowerShell (.NET objects, commandlets, modules, scripts and functions) and then move on to specific tools and an example scenario, in an attempt to introduce the novice users to most PowerShell functionalities that they may come across. This project is by no means a fully-fledged PowerShell guide or an in depth penetration testing manual but an introductory one, aiming to quickly guide the potential readers to start using the tools in question while maintaining a basic understanding of their actions, rather than just blindly typing or pasting commands into a cli window, without understanding at all, how or why these actually operate. It should be mentioned that, nowadays, there is a great number of PowerShell penetration testing tools available, for all phases of the procedure. Many defensive or incident response tools have also emerged. The majority of the offensive tools will be listed and their utility will be presented throughout this project. The offensive PowerShell community is very enthusiastic, thorough and well organized. All projects are developed in the open, on GitHub, so for source-code and in-depth information, please visit the respective links that can be found in the 8. Resources section.el
dc.contributor.masterΑσφάλεια Ψηφιακών Συστημάτωνel
dc.subject.keywordPenetration testingel
dc.subject.keywordPowerShellel
dc.subject.keywordComputer securityel
dc.subject.keyword.Net Frameworkel
dc.subject.keywordWindows (Computer operating systems)el


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές
Except where otherwise noted, this item's license is described as
Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές

Βιβλιοθήκη Πανεπιστημίου Πειραιώς
Contact Us
Send Feedback
Created by ELiDOC
Η δημιουργία κι ο εμπλουτισμός του Ιδρυματικού Αποθετηρίου "Διώνη", έγιναν στο πλαίσιο του Έργου «Υπηρεσία Ιδρυματικού Αποθετηρίου και Ψηφιακής Βιβλιοθήκης» της πράξης «Ψηφιακές υπηρεσίες ανοιχτής πρόσβασης της βιβλιοθήκης του Πανεπιστημίου Πειραιώς»