Post Compromise
There are several key pieces of information we should always obtain:
- Username and hostname
- Group memberships of the current user
- Existing users and groups
- Operating system, version and architecture
- Network information
- Installed applications
- Running processesDisplay network and process info
route print
netstat -ano
powershell -command "Get-Process"
tasklistCheck installed applications
# 32 Bits
Get-ItemProperty "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*" | select displayname
# 64 Bits
Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*" | select displaynameDisplay Application Details
Searching stuff
Checking History
Get DPAPI Master Key
Dumping SYSTEM and LOCAL
DLL Injection (if we have System32 folder write access but cannot get shell)
tzres.dll
Generate a custom DLL and locate it at C:\Windows\System32\tzres.dll
rev.cpp
1.1 Additional (encoding the reverse shell)
Open listener
Attain a system shell access.
Printconfig.dll
Generate a custom DLL and locate it at C:\Windows\System32\spool\drivers\x64\3\Printconfig.dll.
Initiate the PrintNotify object by executing the following PowerShell commands:
Attain a system shell access.
wpcoreutil.dll
phoneinfo.dll
dxgi.dll
wlbsctrl.dll
wbecomn.dll
ualapi.dll
Mimikatz
Fileless Reverse Shell
Double reverse shell (runas also have exe)
Local GetSPN.ps1
Copy and paste the hash , remember replace "space" and all "\n" with "empty"
Cracking the hash with hashcat
Last updated
Was this helpful?