-
-
Notifications
You must be signed in to change notification settings - Fork 359
windows
Rob Fuller edited this page Sep 6, 2012
·
6 revisions
src:
desc:
src:
desc:
src: http://www.room362.com/blog/2011/6/27/fxsstdll-persistence-the-evil-fax-machine.html
desc: Drop malicious fxsst.dll into %SYSDRIVE%\Windows - it's auto loaded by Explorer (each login), real fxsst.dll is in System32 but load order dominates
A number of commands built into windows support UNC (
server
share) paths.
- DLL-Hijacking
- Binding/Planting
- Copy paste-able list 80,443,1433
- # 80, 443 - obvious HTTP(S) ports, usually internally this means printers, but you could find a Intranet page or 2
- 1433 - Default MSSQL port, if you find a "MSSQL Express" installation, there is a good chance this is
- Copy paste-able list 53
- 53 - finding an internal DNS server is usually a gold mine since it's rarely secured against DNZ zone transfers
- discovery
- portscanning
- AV,FW,ReverseShell in One shot!
PowerShell Post Exploitation
- discovery
- portscanning