Firewall

Mostrar información sobre las reglas del Firewall de Windows con PowerShell

1 Star2 Stars3 Stars4 Stars5 Stars (3 votes, average: 5.00 out of 5)
Loading...


Autenticarse en un router de fibra óptica MitraStar GPT-2541GNAC de Movistar y ver la tabla ARP

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...


Autenticarse en un router de fibra óptica MitraStar GPT-2541GNAC de Movistar y ver las reglas del firewall

1 Star2 Stars3 Stars4 Stars5 Stars (2 votes, average: 5.00 out of 5)
Loading...


Rundll32 commands for Windows

1 Star2 Stars3 Stars4 Stars5 Stars (2 votes, average: 5.00 out of 5)
Loading...


Windows services (detailed)

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...

 


Windows services

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

 


Windows Post Exploitation Cmdlets Execution (PowerShell)

1 Star2 Stars3 Stars4 Stars5 Stars (5 votes, average: 5.00 out of 5)
Loading...

Presence This section focuses on information gathering about the victim host and the network that it’s attached to. System

WMI

Networking

Users

Configs

Finding important files

Files to pull

Remote system access

Software

Auto­Start directories

Persistance This section focuses on gaining a foothold to re­gain, or re­obtain access to a system through means of authentication, backdoors, etc.. Download

Compress or expand ZIP archive

Reg command exit

Deleting logs

Uninstalling software “Antivirus”

Invasive or altering commands


Habilitar el firewall de Windows

1 Star2 Stars3 Stars4 Stars5 Stars (2 votes, average: 5.00 out of 5)
Loading...