2H4CK
  • 🎯Home
  • 📰Artigos
    • ☁️Cloud
      • 🌩️Encontrando e explorando buckets S3 expostos
    • 🔐Security
      • 🔥Entendendo e tratando incidentes de segurança
      • 🔢Fases macro de um ataque
      • 🕵️Introdução ao Threat Hunting
      • Let's talk about Wazuh
      • 😼Let's talk about Mimikatz
      • Raspberry Nessus
    • 🌐Web
      • 🌐Como funciona uma aplicação web
      • 💸Comportamento prático de um Stealer
      • 💉Detectando e analisando SQL Injection
      • 🐝OWASP
    • 🪟Windows
      • 🧑‍💻Explorando Kerberos
    • 📡Wireless
      • 🔑Dissecando e atacando o WPA com o Aircrack
  • 🚩CTF
    • 🟩Hack the Box
      • 🖼️Photobomb
    • ☁️TryHackMe
      • 🪟Attacktive Directory
      • 🕵️Basic Pentesting
      • 🥒Pickle Rick
      • 🌶️Startup
      • 🙀Tomghost
      • 👨‍🚀Vulnversity
  • ✏️Field Notes
    • 🐧Linux Cheat Sheet
      • 💿Mounts/Shares
      • 💻Terminal
    • 🪟Windows Cheat Sheet
      • 💻CMD/Powershell Interesting Commands
      • ✏️Windows Registry Interesting Keys
  • 🖥️Labs
    • 🕸️Elastic Purple Team Lab
      • 🧠Simulações
        • 🔎Reconnaissance
        • 👨‍💻Resource Development
        • 👁️Initial Access
        • 💻Execution
        • 🚪Persistence
        • ⏫Privilege Escalation
        • 🕵️Defense Evasion
          • PowerShell Base64 Encoded Command Execution
        • 🔑Credential Access
        • 🔍Discovery
        • ↔️Lateral Movement
        • 📚Collection
        • ▶️Command and Control
        • 🌐Exfiltration
        • 🛑Impact
Powered by GitBook
On this page
  1. 🖥️Labs
  2. 🕸️Elastic Purple Team Lab
  3. 🧠Simulações

🕵️Defense Evasion

PowerShell Base64 Encoded Command Execution
PreviousPrivilege EscalationNextPowerShell Base64 Encoded Command Execution