Microsoft Powershell is an extensible and powerful arsenal to any systems administrator... and hacker. Now being installed by default in Server 2008, Windows 7, and optional in other operating systems, Powershell is something that will be a prevalent default on the most popular operating systems going forward. Since Microsoft removed our method of delivering malicious payloads on a system through Windows debug, we got creative. Through this presentation, we will release two working payloads (bind and reverse) written purely in Powershell and the ability to deliver whatever payload you want onto the operating system and execute. We'll also be releasing a Metasploit auxiliary module utilizing this new attack vector the day of the talk. Also included in this talk is ways of bypassing the execution restrictions which requires no modifications to the operating system to execute powershell backdoors. Lastly, there will be discussion on the future of Powershell and how we can use it for more advanced attack vectors going forward.