

Test this out by typing 'get-‘ then tab through SOOOO many options. This can be useful if (like me) you regularly forget what the command is called, or which argument to pass to it.


PowerShell has the option to hit the Tab key to complete a command. If it was just powershell.exe then this could have been run from a remotely connected attacker, from a compromised external USB device or even a persistence mechanism such as a registry run key. This does not imply that there was a human at that host at the time, tools like AnyDesk, TeamViewer, VNC and even RDP could have been used. If the ISE executable was used this shows that the person running the script had GUI access. This is useful for an investigator to know if the malicious PowerShell script was run from PowerShellISE.exe or PowerShell.exe. The main difference here is being able to test your script immediately. You do not need to use the ISE to create PS1 files, any text editor or external ISE will do the trick! ( cough Notepad++ cough). PowerShell has an ISE (Integrated Scripting Environment) version that can be used to create PS1 files. In this post we will cover some of the basics of using and understanding PowerShell, as well as confirming that what you are seeing is accurate. PowerShell can now be used cross-platform to manage any environment whether that be on-premises or cloud based.īecause of this flexibility PowerShell is used in many aspects of IT, and Security. What started as a closed source, proprietary upgrade to the Command Prompt has now grown into an open-source, resource rich Command Line Interface (CLI) and scripting utility. PowerShell has grown since its introduction in 2003 and implementation in Windows XP in 2006.
