14.2 test review Flashcards
win xp exploit
uses port 135
Meterpreter command:
expoit/windows/dcerpc/ms03_026_dcom
allows exec of staged payload on xp with system payload
win 2k3 exploit
uses port 445
Meterpreter command:
exploit/windows/smb/ms08_067_netapi
does not create logs, creates a buffer overflow
win 2k8 exploit
uses port 445
Meterpreter command:
exploit/windows/smb/ms09_050_smb2_negotiate_func_index
meterpreter piv esc commands
5 of them
getsystem: Elevate privileges to system
getprivs: get privs from current process owner
steal_token: impersonates priv of running proces
drop_token: releases impersonated priviliges
migrate: Injects meterpreter session into another proc
windows scheduled jobs commands
2 of them
at: lists commands and jobs scheduled
schtasks :lists jobs scheduled
windows network services commands
5 of them
netstat -ano: displays all connections, ports, and pid
net use: displays remote shares & connection
net start: lists services
arp -a: prints arp table
route: manipulates routing table
windows system and hardware info commands
4 of them
systeminfo: displays config and processor info
driverquery: lists device drivers and properties
ver: displays windows version
set: displays windows environment variables
windows user and group command
2 of them
net user: displays local user accounts
net localgroup: displays local groups
windows software registry keys
4 of them
reg query hklm\software
reg query hklm\software\microsoft\windows nt\currentversion\winlogon
reg query hklm\software\microsoft\windows\currentversion\run
reg query hklm\software\microsoft\windows\currentversion\runonce
windows powershell commands
4 of them
get-process: lists running processes
get-WmiObject -class win32_useraccount
get-WmiObject -class win32_group
get-ChildItem HKLM:\software
host based security products
3 of them
McAfee
Symantec
Kaspersky
Processes associated with McAfee
5 of them
McScript.exe UpdaterUI.exe/UdateUI.exe FrameworkService.exe CmdAgent.exe McShield.exe
McAfee directory structure
c:\program files\McAfee
McAfee listening ports
Port 6646 (McAfee Network Agent) Port 8081 (open if sending logs to ePO server)
Symantec processes
6 of them
Semsvc.exe ccSvcHst.exe ccApp.exe SMC.exe SMCgui.exe Rtvscan.exe
Kaspersky processes
just one
avp.exe
Symantec directory structure
c:\program files\Symantec
Symantec registry key
HKLM\SOFTWARE\Symantec
Kaspersky registry key
HKLM\SOFTWARE\Kasperskylab
Kaspersky directory structure
C:\program files\kaspersky lab
Kaspersky ports
port 1110
windows logging policy commands
just one
auditpol
meterpreter log cleaning command
2 of them
run event_manager
clearev
meterpreter timestamp manipulation
just one
syntax: timestomp file_to_modify -f file_to_match