You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
TODO
# Sources
http://www.labofapenetrationtester.com/2017/08/week-of-evading-microsoft-ata-day1.html
Dump Hashes
C:\> fgdump.exe
C:\> type 127.0.0.1.pwdump
# Links
TODO
WCE
C:\> wce -w
# Links
TODO
PSExec
# Overview
You need to be an admin already it copies an executable to an admin share and registers a service and starts it
[10:25]
if you wanna be really disruptive you could also drop a payload that kills the proxied service and listens on that port instead
# Links
https://technet.microsoft.com/en-us/sysinternals/psexec.aspx
https://sourceforge.net/projects/winexe/
https://www.rapid7.com/db/modules/exploit/windows/smb/psexec_psh
http://www.powershellempire.com/?page_id=523
UAC ByPass
TODO
# Links
https://github.com/hfiref0x/UACME
WMIC
TODO
# Links
https://github.com/CoreSecurity/impacket/blob/master/examples/wmiexec.py