Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How to play with this Powershell #8

Open
hoangchung0701 opened this issue Dec 5, 2021 · 2 comments
Open

How to play with this Powershell #8

hoangchung0701 opened this issue Dec 5, 2021 · 2 comments

Comments

@hoangchung0701
Copy link

Hello, i'm newbie, when i run this scrip completed i dont know how start practice exploit to that AD. Should setup a workstation client then attack from that client or some thing else ? Hope you help me, thank you so much.

@iNoSec2
Copy link

iNoSec2 commented Jan 7, 2022

Add a workstation with one of the users of generated by the script, add the workstation to the domain. After that you can start attacking with this workstation, ut will simulate your foothold and try to get domain admin from there for example. You can add a second workstation too with a second network and make the DC only accessible on that second network, like that you can work on pivoting too, this is endless

@b3nj1-1
Copy link

b3nj1-1 commented Mar 27, 2022

you try to create a user and use to evil-winrm

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants