[ Pen Testing Windows ] :: Penetration Testing Windows: Powershell/Empire

Powershell

Powershell Powershell is the object-oriented replacement for the ancient Windows cmd.exe. It it not present on all installations of Windows, but can be added via a download from Microsoft. There are five versions of Powershell at the moment (2018). You can start it by typing powershell in the runline or in cmd. Before going any …

[ Pen Testing Windows ] :: Penetration Testing Windows: CrackMapExec

Hacking in the dark

Gather Your Tools First off, be a smart hacker and know how to find great online materials, like this how-to: https://byt3bl33d3r.github.io/getting-the-goods-with-crackmapexec-part-1.html And this excellent tute on CrackMapExec: https://www.ivoidwarranties.tech/posts/pentesting-tuts/cme/crackmapexec/ For the TL;DR of that page, start in Bash: # get syntax and details python crackmapexec.py # network enumeration python crackmapexec.py 192.168.1.0/24 Executing Commands Note that if …

[ Pen Testing Windows ] :: Active Directory: Extracting NTDS and Cracking Hashes

Glenn Norman

Okay, you’ve gotten System user access on your Windows target, and now you want to get the goodies in Active Directory. Here’s the ultra-short version: Open Powershell and enter: ntdsutilActivate Instance ntdsifmcreate full c:\bak_fldrquitquit Check out this video that details of creating the NTDS backup, extracting data with secretsdump.py, https://github.com/SecureAuthCorp/im packet/blob/master/examples/secretsdump.py , and cracking password …