Recent Posts

  • Samba Server Exploitation January 17, 2018
  • GDB Tutorial January 16, 2018
  • Hacking Samba on Ubuntu and Installing the Meterpreter January 16, 2018
Prepare for Offensive Security Certified Professional
Menu
  • Article
  • Industry News for IT Security
  • OSCP
    • OSCP Official Complete Guide
    • OSCP Exp. Sharing
  • Wifi Hacking
  • Online Resources
  • Lab
  • Must Try
  • Vulnerability Database
  • Skills
    • Buffer Overflow
    • Privilege Escalation
    • Null Session
    • SSH

Windows Post-Exploitation Command List

Home / Windows Post-Exploitation Command List
05 Jan

Windows Post-Exploitation Command List

  • Pentester
  • Cheat Sheet,Skills
  • Tags: arp -a, carrot.exe, nbtstat -a, netstat -bano, qprocess, sc qc, systeminfo, tasklist /svc, wmic
  • no comments

WindowsPost-Exploitation

Original Link

Share this Post

← Previous Article Next Article→

Related Articles

  • Windows Privilege Escalation Methods for Pentesters
    Windows Privilege Escalation Methods for Pentesters December 27, 2017
  • Windows Privilege Escalation Fundamentals
    Windows Privilege Escalation Fundamentals December 23, 2017

Comments are closed.

Site Categories

  • Article (15)
  • Backdoor (1)
  • Buffer Overflow (16)
  • Case Studies (2)
  • Cheat Sheet (6)
  • ColdFusion (6)
  • Lab (6)
  • Metasploit (7)
  • Must Try (2)
  • Netcat (1)
  • Null Session (5)
  • Online Resources (2)
  • OS Fingerprinting (1)
  • OSCP Exp. Sharing (8)
  • Payloads (4)
  • Privilege Escalation (14)
  • RFI and LFI (2)
  • Samba / SMB (3)
  • Skills (63)
  • SQL Injection (4)
  • SSH (5)
  • Uncategorized (2)
  • Vulnerability Database (5)
  • Wifi Hacking (2)

Tag Cloud

445 airodump-ng APSB09-09 authentication bypass Buffer Overflow burp bypassuac cfm shell C functions vulnerable data breach fckeditor getsystem getuid google kali kali wifi hack Linux Privilege Escalation memory corruption memory layout metasploit Meterpreter meterpreter command mitm MS08_067 ms11-080 msfvenom null session oscp oscp exp sharing Privilege Escalation ps psexec pyinstaller pywin32 rpcclient shellcode smb stack steal_token systeminfo UAC bypass union injections wifi hacking wifiphisher wmic

Blog Posts

Samba Server Exploitation GDB Tutorial Hacking Samba on Ubuntu and Installing the Meterpreter

Tag Clouds

445 airodump-ng APSB09-09 authentication bypass Buffer Overflow burp bypassuac cfm shell C functions vulnerable data breach fckeditor getsystem getuid google kali kali wifi hack Linux Privilege Escalation memory corruption memory layout metasploit Meterpreter meterpreter command mitm MS08_067 ms11-080 msfvenom null session oscp oscp exp sharing Privilege Escalation ps psexec pyinstaller pywin32 rpcclient shellcode smb stack steal_token systeminfo UAC bypass union injections wifi hacking wifiphisher wmic
Copyright © 2017 pentest.tonyng.net. All rights reserved.
    Scroll