Closed wopot closed 8 years ago
have a look at https://github.com/p3nt4/PowerShdll
you do not have to access to powershell.exe (what is mostly monitored)
This seems to require additional software to be copied onto the victim, which is contrary to the objective of minimising the forensic footprint.
Have I misunderstood?
have a look at https://github.com/p3nt4/PowerShdll
you do not have to access to powershell.exe (what is mostly monitored)