description |
---|
This room will cover all of the basics of post-exploitation; we'll talk everything from post-exploitation enumeration with powerview and bloodhound, dumping hashes and golden ticket attacks with mimikatz, basic information gathering using windows server tools and logs, and then we will wrap up this room talking about the basics of maintaining access with the persistence metaploit module and creating a backdoor into the machine to get an instant meterpreter shell if the system is ever shutdown or reset.
This room will be related to very real world applications and will most likely not help with any ctfs however this room will give you great starting knowledge of how to approach a network after you have gained a shell on a machine.
Powerview is a powerful powershell script from powershell empire that can be used for enumerating a domain after you have already gained a shell in the system.
1.) Start Powershell - powershell -ep bypass
-ep bypasses the execution policy of powershell allowing you to easily run scripts
\
\
\
-
https://metasploit.help.rapid7.com/docs/about-post-exploitation\
-
https://gist.github.com/HarmJ0y/184f9822b195c52dd50c379ed3117993
Tools/Malware Used -