This article will showcase various attacks and tasks that can be performed on a compromised Windows Machine which is a part of a Domain Controller through PowerShell Empire inbuilt Mimikatz Module. Table of Content Introduction DC Sync Attack DC Sync Hash Dump Golden Tickets Extracting Tickets Domain Cache Mimikatz Commands Extracting Certificates Mimitokens Crypto Keys […]
Data Exfiltration using PowerShell Empire
In our previous post, we had already discussed “Command and Control with DropboxC2” But we are going to demonstrate Data Exfiltration by using PowerShell Empire where we will extract the unauthorized data inside our Dropbox account. Here you will learn how an intruder can exfiltrate data over cloud storage. What is Data Exfiltration Data exfiltration […]
OSX Exploitation with Powershell Empire
This article is another post in the Empire series. In this article, we will learn OSX Penetration testing using PowerShell Empire. Table of Content Exploiting MAC Post Exploitation Phishing Privilege Escalation Sniffing Exploiting MAC Here, I’m assuming you know PowerShell Empire’s basics, therefore, we will create the listener first using the following commands: uselistener http […]
Multiple Ways to Exploiting OSX using PowerShell Empire
In this article, we will learn multiple ways to Exploit OSX with PowerShell Empire. There are various stages provided in Empire for this purpose, and we will cover a few of them here. The method to attack OSX is similar to that of Windows, making it a versatile approach for penetration testers. For a beginner’s […]
Hiding IP During Pentest using PowerShell Empire (http_hop)
Introduction to PowerShell Empire Hop Payload This is our fourth article in the Empire series. In this article, we learn to use the hop payload in PowerShell Empire. Empire has an inbuilt listener named http_hop, which allows us to redirect our traffic to one of our other active listeners after getting an agent. Thus, the […]
Windows Persistence with PowerShell Empire
Introduction to Elevated Persistence Methods in Empire We present the third article in our empire series, through which we will learn elevated persistence methods. It organises its trigger method with storage options contained within each module. In Empire, the elevated persistence modules use the trigger method, and different modules require different storage options. All of […]
Multiple Ways to Exploiting Windows PC using PowerShell Empire
This is our second post in the article series ‘PowerShell Empire’. In this article, we will cover all the exploits that lead to windows exploitation with the empire. To read our first post on empire series, which gives a basic guide to navigate your way through empire, click here. Table of Content Exploiting through HTA […]
Hacking with Empire – PowerShell Post-Exploitation Agent
Today’s article is the first post of our Empire series. In this, we will cover every basic you need to know about the PowerShell Empire Framework. And with the eventual, we study advanced exploits of Empire. Table of Content Introduction Installation Importance Terminology Demo Conclusion Introduction Empire is a post-exploitation framework. It’s a pure PowerShell […]