Windows
SMB
Crackmapexec
Swiss army knife for pentesting networks
crackmapexec smb -u users.txt -p passwords.txt --shares 10.10.10.149
crackmapexec smb ip --pass-pol # to get password policy (min len, lockout?, ...)SMB Client
smbclient //ip/share # Don't forget // at beginning
smbclient -L //ip/ # List sharesMount SMB Shares:
sudo mount -t cifs //ip/share /mnt/user/
sudo mount -t cifs -o 'username=admin,password=secret' //ip/share /mnt/user/Get files recursively:
smb: \> recurse ON
smb: \> prompt OFF
smb: \> mget *SMB Server
Create Server on Linux host, access from Windows.
Others
Sysinternals Suite
Official Microsoft tools to do everything Windows.
procdump64.exe to dump processes
Tip for IRL: Creates registry entry when running
Evil-Winrm
Get a shell with username/password. Can test for winrm with crackmapexec first.
rpcclient
Last updated
Was this helpful?