Living Off the Land: Windows Post-Exploitation
Living Off the Land: Windows Post-Exploitation Workflow & Cheatsheet
🎯 Quick Reference Workflow
Initial Access → Reconnaissance → Credential Harvesting → Lateral Movement → Persistence → Exfiltration📋 PHASE 1: INITIAL RECONNAISSANCE
System Information
# OS Information
Get-WmiObject -Class Win32_OperatingSystem | Select-Object Caption, Version, BuildNumber, OSArchitecture
# Domain Check
(Get-WmiObject -Class Win32_ComputerSystem).PartOfDomain
(Get-WmiObject -Class Win32_ComputerSystem).Domain
# Current User Privileges
whoami /allLocal Enumeration
Network Reconnaissance
Software Enumeration
📋 PHASE 2: ACTIVE DIRECTORY ENUMERATION
PowerShell Method
ADSI Method (No Module Required)
Native Tools Method
Remote System Enumeration (WMI)
📋 PHASE 3: CREDENTIAL HARVESTING
LSASS Memory Dump
Registry Credential Extraction
File-Based Credential Search
PowerShell History
Browser Credentials
Credential Manager
Kerberoasting
📋 PHASE 4: LATERAL MOVEMENT
PowerShell Remoting
WMI Execution
DCOM Execution
Scheduled Tasks
Service-Based Movement
netsh Pivoting
📋 PHASE 5: PERSISTENCE
Registry Run Keys
Startup Folder
Scheduled Tasks
WMI Event Subscriptions
📋 PHASE 6: DATA EXFILTRATION
PowerShell Web Upload
certutil
BITS Transfer
SMB Exfiltration
DNS Exfiltration
Email Exfiltration
📋 BYPASSING APPLICATION WHITELISTING
MSBuild Execution
Regsvr32 Scriptlet
Mshta Execution
🛡️ OPSEC CONSIDERATIONS
High-Risk Actions (Likely to Trigger Alerts)
Lower-Risk Alternatives
Cleanup Checklist
📚 DETECTION INDICATORS
Event IDs to Monitor
Suspicious Patterns
🎯 QUICK WINS CHECKLIST
📖 Key References
PreviousPost-ExploitationNextLiving Off the Land: Windows Post-Exploitation—With Tactical Context & Usage Guide
Last updated