Final Project/Presentation for CS 4177, Software Vulnerabilities. Showcases the use of Powershell-Empire, a now deprecated post-exploitation framework.
This Project was completed with the assistance of three group members!
Special Thanks to:
- What is Powershell-Empire?
- What Files are Enclosed Here?
- Video Demonstration.
- Virtual Machine Usage.
- Powershell-Empire was an open-source post-exploitation agent that ran through Windows Powershell.
- It allowed for a user to generate attack scripts for use against other Windows machines, MacOS, or Linux subsystems.
- It is not offically maintained as of August of 2019, but a fork was used as a base for the creation of this cybersecurity excercise.
Filename | Type | Description |
---|---|---|
DemoPresentation_Software... | .pptx | PowerPoint used during live demo. |
InfoPresentation_Software... | .pptx | PowerPoint used to inform audience about PowerShell-Empire. |
Poster_Software... | .pptx | PowerPoint that contains a single slide "poster" about PowerShell-Empire. |
Exercise_Software... | .docx | Word Document that contains instructions on how to use PowerShell-Empire, in the same format used in CS4177. |
Final_Powershell_Command_Encoded_Base64 | .ps1 | Script used in Windows PowerShell. It contains instructions to take control of a Windows 7 Professional Virtual Machine. |
Powershell_Empire_Screenshot | .png | Sample Screenshot of Kali Linux & Windows 7 Professional. Used for this README. |
- A video demonstrating the use of PowerShell-Empire was created by myself for this project.
- Since it is too big to upload here, it can be found at this link:
- Due to this project involving the use of multiple computers at once, I decided to utilize Virtual Machines.
This Project REQUIRED the use of Two Virtual Machines. They were:
- Kali Linux, with the additional installiation of PowerShell-Empire.
- It can be found HERE:
- Windows 7 Professional Edition. [Now discontinued and no longer supported by Microsoft, it can be obtained for free via Archive]
- It can be found HERE: