If on windows we can use impacket or crackmapexec to run commands on PowerShell / cmd on windows machine
impacket-psexec -h
| |
-x for normal shell and -X for PowerShell
| |
if multiple ppl share same admin ->
| |
the SAM file contains password hashes for users
| |
if we only get the hash and not the password we can still login only by passing the hash
| |
Sniffing for hashes: setting up a responder which listens for a “misstype” on the broadcast for hashes sudo responder -I ens33
stored in /
| |
cracking with hashcat
| |
SMB poisonung
Turn setting off in responder / check
| |
Using impacket to poison the response and execute a PowerShell command with -c flag: https://www.revshells.com/
| |
’