🔬Win Post Exploitation - MSF
Lab 1 - HTTP/HFS
service postgresql start && msfconsole -qdb_status
setg RHOSTS 10.2.16.114
setg RHOST 10.2.16.114
workspace -a Windows_PostExpdb_nmap -sV 10.2.16.11480/tcp open http HttpFileServer httpd 2.3
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
3389/tcp open ssl/ms-wbt-server?
49152/tcp open msrpc Microsoft Windows RPC
49153/tcp open msrpc Microsoft Windows RPC
49154/tcp open msrpc Microsoft Windows RPC
49155/tcp open msrpc Microsoft Windows RPC
49165/tcp open msrpc Microsoft Windows RPCSome commands
Some Post Exploitation











Lab 2 - UAC Bypass
Exploitation / Meterpreter x64
Privilege Escalation
Bypass UAC


Hashes Dump
Lab 3 - Token Impersonation
Exploitation / Meterpreter x64
Privilege Escalation
Lab 4 - Dump Hashes Mimikatz
Exploitation
Hash Dumping - Kiwi
Hash Dumping - Mimikatz.exe
Lab 5 - Pass-the-Hash with PsExec
Exploitation
Privilege Escalation
Lab 6 - Persistence
Exploitation
Persistence

Lab 7 - Enabling RDP
Exploitation
Enable RDP


Lab 8 - Keylogging
Exploitation
Keylogging

Lab 9 - Clearing Event Logs
Exploitation
Clearing Windows Event Logs

Lab 10 - Pivoting
Exploitation
Pivoting


Port Forwarding




Last updated


