Where you can run shellcode inside an ordinary process, how can you (quietly) "upgrade" to get offensive Powershell code running from it?
Let’s say you are working on a project where you are able to execute shellcode (with no size limit or character restrictions) inside a certain process on a Windows machine. You want to leverage that to setup a Powershell exec… Continue reading Where you can run shellcode inside an ordinary process, how can you (quietly) "upgrade" to get offensive Powershell code running from it?