[collect]一些Windows命令[bak]

本文最后更新于2014年7月5日,已超过 1 年没有更新,如果文章内容失效,还请反馈给我,谢谢!

内网(域)渗透–1.基本命令

====================================================

====================================================

====================================================

===================================================

====================================================

Password hashes dump tools    ——抓hash工具列表[大集合]

参考链接:

声明: 除非注明,ixyzero.com文章均为原创,转载请以链接形式标明本文地址,谢谢!
https://ixyzero.com/blog/archives/421.html

《[collect]一些Windows命令[bak]》上有14条评论

  1. 内网渗透的一些工具和平台汇总
    https://www.secpulse.com/archives/54670.html

    框架/平台:Metasploit、Cobaltstrike、Empire、Empyre
    代理/端口转发:sockscap、proxifier、Redsocks、Proxychains、SSH本地/远程端口转发、netcat/socat/hping、Metasploit
    端口扫描:nmap、fscan、Metasploit、Portscan.ps1
    PowerShell脚本:nishang、powersploit、PowerTools、PowerShell-AD-Recon


  2. •2: Interactive logon — This is used for a logon at the console of a computer. A type 2 logon is logged when you attempt to log on at a Windows computer’s local keyboard and screen.

    •3: Network logon — This logon occurs when you access remote file shares or printers. Also, most logons to Internet Information Services (IIS) are classified as network logons, other than IIS logons that use the basic authentication protocol (those are logged as logon type 8).

    •4: Batch logon — This is used for scheduled tasks. When the Windows Scheduler service starts a scheduled task, it first creates a new logon session for the task, so that it can run in the security context of the account that was specified when the task was created.

    •5: Service logon — This is used for services and service accounts that log > on to start a service. When a service starts, Windows first creates a logon session for the user account that is specified in the service configuration.

    •7: Unlock—This is used whenever you unlock your Windows machine.

    •8: Network clear text logon—This is used when you log on over a network and the password is sent in clear text. This happens, for example, when you use basic authentication to authenticate to an IIS server.

    •9: New credentials-based logon—This is used when you run an application using the RunAs command and specify the /netonly switch. When you start a program with RunAs using /netonly, the program starts in a new logon session that has the same local identity (this is the identity of the user you are currently logged on with), but uses different credentials (the ones specified in the runas command) for other network connections. Without /netonly, Windows runs the program on the local computer and on the network as the user specified in the runas command, and logs the logon event with type 2.

    •10: Remote Interactive logon—This is used for RDP-based applications like Terminal Services, Remote Desktop or Remote Assistance.

    •11: Cached Interactive logon—This is logged when users log on using cached credentials, which basically means that in the absence of a domain controller, you can still log on to your local machine using your domain credentials. Windows supports logon using cached credentials to ease the life of mobile users and users who are often disconnected.

发表评论

电子邮件地址不会被公开。 必填项已用*标注