How to Break Out of Hyper-V and Compromise Your Admins
(truesec.com)
In this blog post we will explain novel attacks scenarios that affects the widely used protocols PowerShell Remoting and PowerShell Direct. Are you using PowerShell Remoting to manage your environment? Are you using PowerShell Direct to manage virtual machines in your hypervisor platform? Then you need to read this and take action to ensure you are not affected.
In this blog post we will explain novel attacks scenarios that affects the widely used protocols PowerShell Remoting and PowerShell Direct. Are you using PowerShell Remoting to manage your environment? Are you using PowerShell Direct to manage virtual machines in your hypervisor platform? Then you need to read this and take action to ensure you are not affected.