Initial Acces / Aggressors
Try get cob to load against 127.0.0.2
PowerShell:
Try stick to powerpick using PPID spoofing
agressor to check for powershell modules:
Host Recon:
Think about running:
KeeTheif/ enum password managers
SessionGopher - Steal session tokens/ Passwords
SessionSearch
Invoke-ShareFinder |
Invoke-ShareFinder -ExcludeStandard -NoPing -CheckShareAccess
Find interesting files |
Find-InterestingFile -Path C:\Users\Admin -Terms local
Search for local admin access |
Find-LocalAdminAccess
or trydir \\host\C$
Domain Trusts:
PowerView - Invoke-MapDomainTrust
Invoke-MapDomainTrust | Export-CSV - NoTypeInformation C:\Windows\Temp\trust.csv
View map using yED
Immediate Persistence:
UserInitMprLogonScript
Last updated