Post Compromise

There are several key pieces of information we should always obtain:

- Username and hostname
- Group memberships of the current user
- Existing users and groups
- Operating system, version and architecture
- Network information
- Installed applications
- Running processes

Display network and process info

route print
netstat -ano
powershell -command "Get-Process"
tasklist

Check installed applications

# 32 Bits
Get-ItemProperty "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*" | select displayname

# 64 Bits
Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*" | select displayname

Display Application Details

Searching stuff

Checking History

Get DPAPI Master Key

Dumping SYSTEM and LOCAL

DLL Injection (if we have System32 folder write access but cannot get shell)

tzres.dll

  1. Generate a custom DLL and locate it at C:\Windows\System32\tzres.dll

rev.cpp

1.1 Additional (encoding the reverse shell)

  1. Open listener

  1. Attain a system shell access.

Printconfig.dll

  1. Generate a custom DLL and locate it at C:\Windows\System32\spool\drivers\x64\3\Printconfig.dll.

  2. Initiate the PrintNotify object by executing the following PowerShell commands:

  1. Attain a system shell access.

wpcoreutil.dll

phoneinfo.dll

dxgi.dll

wlbsctrl.dll

wbecomn.dll

ualapi.dll

Mimikatz

Fileless Reverse Shell

Double reverse shell (runas also have exe)

Local GetSPN.ps1

Copy and paste the hash , remember replace "space" and all "\n" with "empty"

Cracking the hash with hashcat

Last updated

Was this helpful?