Skip to content

Access servers and get proofs

lethanhtung01011980 edited this page Oct 22, 2019 · 1 revision

After added admin users

Windows

  • rdesktop -u newuser -p newpass victim_ip <=========== May need to run this to open a dummy RDP if LoginError timeout

Search for a file

  • C:\>dir /s /b proof.txt
  • C:\>dir /s /b network-secret.txt

Read a file

  • C:\>type "C:\Documents and Settings\Administrator\Desktop\proof.txt"
  • C:\>type "C:\Documents and Settings\Administrator\Desktop\network-secret.txt"

Linux

  • ssh -u root -p
  • find / -name proof.txt

Sidebar

0. COMMON exploits

1. Scan Info

1.2 Passive Gathering

1.3 Active Gathering

2. Pre-attack

2.2 File transfer

3. Get Reverse Shell

4. Exploits

4.2 Windows Exploits

4.3 Linux Exploits

4.4 Password crack

4.5 Buffer Overflow

4.6 Web attacks

6. Escalate Privilege

6.1 Escalate in Windows

6.2 Escalate in Linux

7. Access and further attacks

8. Port redirection and Tunnelling

9. Metasploit

10. Kali

11. Thirdparty scripts

Clone this wiki locally