Kali Linux 2018.1 安装PowerShell

PowerShell 是一个微软开发的自动化任务和配置管理系统。它基于 .NET 框架,由命令行语言解释器(shell)和脚本语言组成。
PowerShell 提供对 COM (组件对象模型) 和 WMI (Windows 管理规范) 的完全访问,从而允许系统管理员在本地或远程 Windows 系统中 执行管理任务,以及对 WS-Management 和 CIM(公共信息模型)的访问,实现对远程 Linux 系统和网络设备的管理。
通过这个框架,管理任务基本上由称为 cmdlets(发音 command-lets)的 .NET 类执行。就像 Linux 的 shell 脚本一样,用户可以通过按照一定的规则将一组 cmdlets 写入文件来制作脚本或可执行文件。这些脚本可以用作独立的命令行程序或工具。

1.环境:kali linux 2018.1 , powershell_6.0.1-1.debian.9_amd64.deb

2.下载(科学上网):https://github.com/PowerShell/PowerShell
这里写图片描述
有kali版没测试过
这里写图片描述

3.安装:dpkg -i powershell_6.0.1-1.debian.9_amd64.deb
这里写图片描述
解决依赖关系:apt install -f
这里写图片描述
覆盖安装:dpkg -i powershell_6.0.1-1.debian.9_amd64.deb

4.启动:启动命令并不是powershell 而是pwsh
这里写图片描述

5.测试一下:
这里写图片描述
某powershell 脚本工具:
这里写图片描述

PS:最新版本kali 只能安装debian.9 版本才能正确解决依赖关系,debian.8是不可以的,并且只支持kali linux 64位

  • 2
    点赞
  • 2
    收藏
    觉得还不错? 一键收藏
  • 2
    评论
With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In “Intermediate Security Testing with Kali Linux 2”, you will learn how hackers find out information about your systems, locate weaknesses in your security and how they gain access to your devices. This hands-on, step by step learning book doesn’t dwell on the theory of security, but instead walks you through implementing and using the latest security tools that are included in the most popular computer security testing platform, Kali Linux 2. This book takes off were my first Basic book ends, showing you what has changed in the latest version of Kali Linux. We then cover putting together a penetration testing lab using Windows and Linux based systems. Next we cover in-depth ways to use Metasploit, by seeing the latest techniques to create backdoor shells and bypassing anti-virus. We also cover automating Metasploit, including scripting based attacks using both Railgun and PowerShell. In the web application section we cover many of the tools and techniques used against websites. Over 30 tools are covered ranging from scanning to exploiting, including the ever popular BurpSuite. In the Attacking Smart Devices section we will see how to create virtual phones or tablets, getting remote shells on Android devices and how Wi-Fi and Man-in-The Middle attacks work against smart devices. Lastly, the book has an entire section of using computer security tools for forensics, an Internet of Things section and an entire chapter devoted to defending your systems.

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 2
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值