WhileNetworking

  • Home
  • CCNA
  • Cisco Packet Tracer Download
    • Cisco packet tracer 6.3
    • cisco packet tracer 6.2
    • Cisco Packet Tracer 7
  • Linux Server Management
  • About Us
  • Privacy Policy
  • Contact Us

Example of Post-Exploitation

You are most welcome to this post.
powershell.exe command
Really thanks to you for your interest in this topics. :)

During the post-exploitation form, attackers ofttimes use tools such as PowerShell and Mimikatz on compromised machines in prescribe to turn a large accomplishment on the victim’s organisation and mesh, and open continual right.

Attackers give want to learn radical grouping entropy for the organization they are on, what somebody circumstance they are spouting low, processes that are flying, services on the scheme, and other fabric principle to read near the machine and capabilities they
Windows PowerShell is a task automation and design direction support from Microsoft, consisting of a command-line take and associated scripting module stacked on the .NET Frame. PowerShell is a real ruling scripting communication included with Windows 7 and after versions of Windows. Some IT organizations use PowerShell to automate and deepen Windows direction tasks. PowerShell can be used to download files from the Internet, to locomote files between systems, institute cloth listeners for tunneling, distil event log accumulation from distant machines, and far solon tasks expedient for administrators, attackers, and defenders.

PowerShell is typically whitelisted and its spiteful scripts are ofttimes not caught by anti-virus software. The characteristics of PowerShell countenance the succeeding:

PowerShell can run from retention (no poverty to compose file to plow)

PowerShell can run on device machine (if aggressor knows the credentials of aim organization)

PowerShell scripts can be obfuscated by fragmentation and encoding with base64 to avoid detection, and these scripts are interpreted by PowerShell.

PowerShell policies on machines to not run unsigned scripts can be bypassed by multiple commands such as -ExecutionPolicy Avoid or by piping commands together in bound sequences.

Unless PowerShell overlook auditing is explicitly enabled on a group, there is no shadow of the types of scripts or different actions that are expropriated by an assailant using PowerShell to aid investigative efforts.
Metasploit is a joint onset investigation software agency. One of the features of Metasploit is its slave armament for spot victimization activities. Meterpreter has been matured within Metasploit for making the station exercise activities faster and easier. Meterpreter is an innovative multi-function load that can be victimised to leverage the Metasploit capabilities dynamically at run clip in a remote grouping where the attackers don’t tally their crime tools there. Meterpreter is a explosive within the Metasploit Support that provides check over an used spot legion. Meterpreter resides completely in the retention of the used army and leaves no traces on the horny propulsion, making it really awkward. Mimikatz is a post-exploitation slave that was typewritten by Benjamin Delpy. Mimikatz is one of the tools to collecting credential information from Windows systems. Mimikatz It’s now easily noted to choose plaintext parole, hash, PIN write, and kerberos tickets from retention. Mimikatz supports 32-bit and 64-bit Windows architectures. Mimikatz can be compiled as a standalone possible, or can be run as a power wrong PowerShell.

Some of the initial commands that are often run by an attacker who gains access to a machine are built-in operating system tools that are used for system administration, and are not unique to malicious activity:

  • whoami: show the user account and domain information as applicable.
  • ipconfig: show the network configuration, gateway, DHCP, and DNS server information.
  • netstat –anop: show all active, listening, and closed network connections.
  • quser: list the users who are logged on to system.
  • tasklist: list all the running processes.
  • schtasks: show all the tasks set to run on the system at certain intervals.
  • sc: list all the services set to run on the system.
  • net start: Start services to run on a system.

The powershell.exe command can be used to start a Windows PowerShell session from the Windows command line as shown below.

powershell.exe command

powershell.exe command

The example below shows using the native Mimikatz command from the Metasploit meterpreter to extract the passwords hashes from the compromised machine.

Mimikatz command from the Metasploit meterpreter

Mimikatz command from the Metasploit meterpreter

Jul 24, 2018Himadri
 

Share with friends :

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to email a link to a friend (Opens in new window)
  • Click to share on Pocket (Opens in new window)
  • Click to share on Telegram (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to print (Opens in new window)

Related

Know about exploit kits and rootkitsAngler - Example of Exploit Kit

Leave a Reply Cancel reply

one × 1 =

Himadri

Hi, I'm Himadri. I love blogging with tech topics, specially computer networking. We'll have more fun in the upcoming day. Stay with me. :)

July 24, 2018 Cyber Security158
Feel Free to Share :)
0
GooglePlus
0
Facebook
0
Twitter
0
Digg
0
Delicious
0
Stumbleupon
0
Linkedin
0
Pinterest
Find Us on Facebook
Choose a category !!
  • CCNA
  • Cisco Certification Exam
  • cisco packet tracer 6.2
  • Cisco packet tracer 6.3
  • Cisco Packet Tracer 7
  • Cisco Packet Tracer 7.1
  • Cisco Packet Tracer 7.2.1
  • Cisco Packet Tracer 7.3
  • Cyber Security
  • Engineering Ebooks
  • Excel
  • IELTS Ebook
  • Internet
  • Know computer
  • Know your computer
  • Laser Processing of Material
  • Linux installation and server management
  • PDF
  • Technology
  • Uncategorized
Top posts
  • Free download Principles of Electronics by VK Mehta
  • How to change Cisco packet tracer default language?
  • The Diffie-Hellman (DH) algorithm
Archieves
Get latest updates by Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 19 other subscribers
W
SC
wordpress counter
Analytics
Recent Comments
    Browse by categories
    Cyber SecurityLinux installation and server managementCCNAKnow your computerKnow computerCisco Packet Tracer 7UncategorizedCisco Certification ExamInternetPDFCisco Packet Tracer 7.3Engineering EbooksCisco packet tracer 6.3cisco packet tracer 6.2Cisco Packet Tracer 7.1TechnologyExcelLaser Processing of MaterialCisco Packet Tracer 7.2.1IELTS Ebook
    Feel free to contact with us

    Hi, any kind of comment or suggestion is valuable to us. So feel free to contact with us.

    Email: himadri.shekhar.bd@gmail.com

    Name: WhileNetworking.com

    2021 © WhileNetworking
     

    Loading Comments...