Day: March 1, 2017

Bash Bunny

The best penetration testers know that with the right tools and a few seconds of physical access, all bets are off. It opens up attack surfaces that weren’t possible before in one single device. Penetration testing attacks and IT automation tasks are all delivered in seconds with the Bash Bunny. By emulating combinations of trusted USB devices – like gigabit Ethernet, serial, flash storage and keyboards – computers are tricked into divulging data, exfiltrating documents, installing backdoors and many more exploits. Exploiting local network attack vectors, the Bash Bunny emulates specialized Ethernet adapters. Each attack, or payload, is written in […]

Ejecutar código PHP desde PowerShell

Ejercicios de PowerShell: crear el juego de piedra, papel o tijera

Tareas programadas en PowerShell

Crear un servidor web con PowerShell

Servidor web

Petición desde PowerShell

Fuente original: