Red Teaming And Windows Notes
  • Windows
    • Local Privilege Escalation
      • PRIVILEGES INFORMATION
      • Open Ports
      • Stored Creds
      • PowerShell/CMD History
      • Unquoted Service Paths
      • Evaluating Vulnerable Drivers
      • Printer
      • $PATH interception
    • Shell generators
    • Credentials Hunting.
      • Mimikatz
      • Secretsdump
      • Pypykatz
    • Active Directory
      • Quick Wins
      • Tools
      • Basic Recon
      • Laps Password Read
      • Weaponizing Windows
        • Weaponizing Windows Pt-1
      • Winrm Using Certificate[PFX]
      • WriteOwner
    • Powershell
    • Password Spray And Roasting
Powered by GitBook
On this page
  1. Windows
  2. Active Directory

Weaponizing Windows

PreviousLaps Password ReadNextWeaponizing Windows Pt-1

Last updated 3 years ago

1) Install Commando VM 2) Connect windows VM with Linux VM. 3) Start Attacking

Connecting Windows VM with Linux VM

On Windows VM, set Default Gateway to the IP of the Linux VM.

Get the Linux VM IP and add to Default Gateway.

After this setup, all Windows traffic will flow from Windows to Linux. On the Linux machine start forwarding the traffic.

sudo sysctl -w net.ipv4.ip_forward=1
sudo /sbin/iptables -t nat -A POSTROUTING -o tun0 -j MASQUERADE
sudo /sbin/iptables -A FORWARD -i tun0 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
sudo /sbin/iptables -A FORWARD -i eth0 -o tun0 -j ACCEPT

Make sure to change the port, here I am connected to a VPN, tun0 interface. And my local network eth0interface.

Setup for Default Gateway
Linux VM IP