Skip to content

Latest commit

 

History

History
104 lines (49 loc) · 3.66 KB

post-exploitation-basics.md

File metadata and controls

104 lines (49 loc) · 3.66 KB
description

Post-Exploitation Basics

This room will cover all of the basics of post-exploitation; we'll talk everything from post-exploitation enumeration with powerview and bloodhound, dumping hashes and golden ticket attacks with mimikatz, basic information gathering using windows server tools and logs, and then we will wrap up this room talking about the basics of maintaining access with the persistence metaploit module and creating a backdoor into the machine to get an instant meterpreter shell if the system is ever shutdown or reset.

This room will be related to very real world applications and will most likely not help with any ctfs however this room will give you great starting knowledge of how to approach a network after you have gained a shell on a machine.

Enumeration w/ Powerview

Powerview is a powerful powershell script from powershell empire that can be used for enumerating a domain after you have already gained a shell in the system.

1.) Start Powershell - powershell -ep bypass -ep bypasses the execution policy of powershell allowing you to easily run scripts

\

Enumeration w/ Bloodhound

Dumping hashes w/ mimikatz

\

Golden Ticket Attacks w/ mimikatz

\

\

\

Enumeration w/ Server Manager

Maintaining Access

Resources

Tools/Malware Used -