16 - Useful Tools

Topics

  1. Introduction to the Windows Shells

  2. Windows Permissions

  3. Reverse Shells in Windows

  4. SeImpersonatePrivilege Exploitation

  5. On Cross Compilation

  6. Windows Services

  7. Weak Service Permissions

  8. Unquoted Service Path

  9. DLL Hijacking

  10. Always Install Elevated

  11. Files with Sensitive Data

  12. Windows Hashes

  13. Stored Credentials and the Windows Vault

  14. Scheduled Task

  15. Critical Registry Paths

  16. Useful Tools

  17. AMSI Bypass

Why Do We Use Tools?

In the field of cybersecurity, tools play a crucial role in automating repetitive, complex, or otherwise resource-intensive tasks. They help professionals save time and effort, which are often limited during assessments or incidents. A good tool should:

  1. Clearly define its purpose and scope.

  2. Be simple to use relative to its functionality.

  3. Integrate seamlessly into automation workflows.

  4. Provide concise and clear output.

  5. Remain minimalistic, avoiding unnecessary features.

  6. Be well-documented and, if possible, modifiable for specific needs.

Why Mindset Matters

While tools are powerful, understanding the underlying concepts they automate remains essential. This knowledge ensures that you can:

  • Customize tools to your needs.

  • Develop solutions in environments where tools are unavailable.

  • Mitigate tool-related detection by defenders during offensive operations.

The best tool is always a well-trained mind.


Useful Tools (Windows)

Certutil

Built-in Windows utility often used for certificate management. It can also download files:


Invoke-WebRequest (iwr)

PowerShell cmdlet to download files:


Netcat (nc)

A versatile networking tool for creating reverse shells, listening ports, and file transfers. Example for reverse shell:


Invoke-PowerShellTcp

A PowerShell reverse shell script:


Msfvenom

Tool for generating payloads. Example for a reverse shell:


MinGW32

A cross-compiler for building Windows binaries from Linux. Example of building a basic program:

Compile using:


PrintSpoofer

Exploit for abusing the SeImpersonatePrivilege:


GodPotato

Similar to PrintSpoofer, used for exploiting SeImpersonatePrivilege:


WinPEAS

Windows Privilege Escalation Awesome Script:


PowerUp

PowerShell script for auditing privilege escalation:


PrivescCheck

Identifies misconfigurations leading to privilege escalation:


BeRoot

Post-exploitation script for privilege escalation checks:


Mimikatz

Advanced credential-dumping tool:


Impacket

Python library for working with Windows protocols:


Responder

Poisoning tool for capturing hashes:


Chisel

TCP/UDP tunneling tool for pivoting:


Hashcat and John the Ripper

Tools for cracking passwords and hashes:


CrackMapExec

Network exploitation and post-exploitation framework:

Last updated