PowerShell is one of the most powerful tools in the Windows ecosystem. It’s used extensively by administrators and adversaries alike. Threat actors abuse PowerShell to execute commands, evade detection, and maintain persistent access, often without ever dropping a file on disk.
Our PowerShell Webshell threat emulates a common post-exploitation scenario:
An attacker gaining requisite access deploys a webshell via PowerShell for persistence and to carry out further actions.
SCYTHE users can safely emulate this behavior, observe the impact, and test their detection and response capabilities with a downloadable threat package.
This Empower threat emulates a threat actor gaining administrative access to a Windows system and installing a PowerShell-based webshell. This webshell allows for remote execution of any PowerShell or command-line instructions via the HTTP Subsystem. To ensure communications with the host, a firewall rule is put in place to allow access via a specific port for the webshell. Once accessed, the threat actor can poll tasks and retrieve results remotely.
Key characteristics:
Once deployed, the webshell provides remote control of the system—allowing adversaries to run reconnaissance, move laterally, deploy additional tools, and exfiltrate data.
PowerShell-based attacks are widespread and increasingly difficult to detect. According to Red Canary’s 2024 Threat Detection Report, PowerShell remains the most commonly used technique in real-world incidents. Microsoft’s 2023 Digital Defense Report noted that nearly 35% of initial access investigations involved webshells. Just a few reasons adversaries favor PowerShell include:
Combined with a webshell, PowerShell gives attackers stealthy, remote control that blends in with legitimate administrative activity. This makes these threats both dangerous and persistent, especially in Microsoft-heavy enterprise environments.
Defensive tools and policies are only as good as their performance in real-world conditions. Threat emulation is the process of safely mimicking adversary behavior to test those defenses.
Emulating a threat such as this one allows security teams to:
This turns theoretical readiness into practical confidence and helps organizations understand the real impact of a breach scenario before one happens.
SCYTHE clients receive access to a downloadable threat package, which includes:
Whether you’re on a Red, Blue, or Purple Team, SCYTHE threats provide you a realistic, controlled way to emulate adversary activity using custom-built tools, modules, and OS native capabilities like PowerShell. We strive to provide you with a way to emulate these techniques safely and proactively before an attacker uses them against you.
If your security strategy relies on assumptions, it’s time to put them to the test. Start emulating threats today.