https://www.vipshare.com/【WorkWin】
https://www.netsupportmanager.com/zh-CN/【NetSupportManager】
https://github.com/quasar/Quasar
https://github.com/n1nj4sec/pupy
https://github.com/Cr4sh/MicroBackdoor
https://github.com/orangetw/tsh
https://github.com/yuanyuanxiang/SimpleRemoter
https://github.com/Cc28256/CcRemote
https://github.com/rapid7/metasploit-framework
https://github.com/BishopFox/sliver
https://github.com/HavocFramework/Havoc
https://github.com/HackerCalico/Magic_C2
Windows下权限维持
1、启动文件夹
2、注册表
3、服务
4、任务计划
Linux下权限维持
1、修改/etc/shadow中密码
2、写入ssh公钥
# Windows下权限提升
0x01 漏洞提权
https://github.com/Ascotbe/Kernelhub
https://github.com/SecWiki/windows-kernel-exploits
https://forum.butian.net/share/860
https://github.com/uknowsec/SweetPotato
# Linux下权限提升
0x01 漏洞提权
https://github.com/The-Z-Labs/linux-exploit-suggester
https://github.com/jondonas/linux-exploit-suggester-2
https://github.com/liamg/traitor
https://github.com/peass-ng/PEASS-ng/tree/master/linPEAS
https://gtfobins.github.io/
0x02 SUID提权
原理很简单自行DeepSeek,具体做法是,执行如下命令寻找具有SUID位的可执行文件
find / -perm -4000 -type f -exec ls -l {} \;
https://github.com/CodeSecurityTeam/frp
https://github.com/jpillora/chisel
https://github.com/zema1/suo5
https://github.com/L-codes/Neo-reGeorg
# Windows下凭证窃取
# Linux下凭证窃取
0x01 可以获取密文
01、读取/etc/shadow后,使用cmd5进行解密:
https://www.cmd5.com/
注意,在cmd5中先识别类型,再进行解密
02、若cmd5中不能解密,可尝试hashcat解密,使用如下网站识别加密类型:
https://www.tunnelsup.com/hash-analyzer/
https://hashcat.net/wiki/doku.php?id=example%20hashes
爆破使用如下字典:
https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt
最后执行如下命令:
hashcat -m 3200 ./hash.txt ./rockyou.txt
0x02 无法获取密文
01、劫持ssh密码
https://github.com/aleenzz/InjectSQLServer【ASPX网站数据库密码加密存储】
https://github.com/GhostPack/Seatbelt
https://github.com/lintstar/SharpHunter
https://github.com/qwqdanchun/Pillager
Windows下主机敏感信息收集
Linux下主机敏感信息收集
https://github.com/shmilylty/netspy
https://github.com/shadow1ng/fscan
https://github.com/lcvvvv/kscan
nltest
通过webshell上传文件失败时,有时是因为文件过大,可尝试先分割,上传后再合并
md5sum f
split -b 3M --verbose f f_
cat f_aa f_ab f_ac > f
md5sum f
【免杀的横向移动命令执行】https://github.com/rootclay/WMIHACKER
域环境下常规打法:上传bloodbound客户端搜集域内信息,把结果回传本地后,利用kali的bloodbound服务端解析,分析域内的薄弱环节
https://github.com/safe6Sec/command
https://mp.weixin.qq.com/s/tqd9jJJv4bmzN6xVdpGDow
https://mp.weixin.qq.com/s/LK8zfWlz0s3v93sIY9DztQ【某师傅造的仿真环境,从GetShell到提权root】