• security
  • Introduction
  • The Basics
    • Linux
      • Basics of Linux
      • Bash-scripting
      • Vim
      • nano
    • Windows
      • Basics of Windows
      • PowerShell
      • PowerShell Scripting
      • CMD
    • Scripting With Python
      • Python Fundamentals
      • Useful Scripts
    • Transferring Files
      • Transfering Files on Linux
      • Transfering files on Windows
    • Firewalls
    • General tips and tricks
  • Recon and Information Gathering Phase
    • Passive Information Gatherig
      • Identify IP-addresses and Subdomains
        • Identify IP-addresses
        • Find Subdomains
          • DNS Basics
          • Finding subdomains
          • DNS Zone Transfer Attack
      • Identifying People
      • Search Engine Discovery
      • Identifying Technology Stack
    • Active Information Gathering
      • Port Scanning
  • Vulnerability analysis
    • Non-HTTP Vulnerabilities
      • Common ports/services
      • Port Knocking
    • HTTP - Web Vulnerabilities
      • Common Web-services
      • WAF - Web Application Firewall
      • Attacking the System
        • Web Directory Enumeration
        • Local File Inclusion
        • Remote File Inclusion
        • SQL-Injections
        • Nosql-Injections
        • XML External Entity Attack
        • Bypass File Upload Filtering
        • Exposed Version Control
        • Host Header Attack
        • PHP-Specific Quirks
      • Attacking the User
        • Clickjacking
        • Broken Authentication or Session Management
        • Content Spoofing
        • Insecure Direct Object Reference (IDOR)
        • Subdomain Takeover
        • Cross Site Request Forgery
        • Cross-Site Scripting
          • Examples
          • DOM-based XSS
        • Browser Vulnerabilities
        • Session Fixation
    • Automated Vulnerability Scanners
  • Exploiting
    • Social Engineering
    • Shells
    • Webshell
    • Generate Shellcode
    • Compiling and Editing Exploits
  • Post Exploitation
    • Spawning Shells
    • Meterpreter for Post-Exploitation
    • Privilege Escalation - Linux
    • Privilege Escalation - Windows
    • Escaping Containers
    • Escaping Restricted Shells
    • Bypassing antivirus
    • Loot and Enumerate
      • Loot Windows
      • Loot Linux
    • Persistence
    • Cover your tracks
    • Data Exfiltration
  • Password Cracking
    • Generate Custom Wordlist
    • Offline Password Cracking
    • Online Password Cracking
    • Pass the Hash - Reusing Hashes
  • Windows Active Directory
    • Domain Controllers
    • Windows Remote Management
    • LDAP
  • Pivoting
  • Network traffic analysis
    • Arp-spoofing
      • SSL-strip
    • DNS-spoofing
    • Wireshark
  • Wifi
    • WEP
    • WPS
  • Cryptography
    • Padding Oracle Attack
  • Steganography
  • Reverse Engineering
  • Physical access to machine
  • Literature
  • Quick References
    • Quick Commands
Powered by GitBook

Windows Remote Management

5985 and 5986

http://www.tomsitpro.com/articles/powershell-remote-management,2-781.html

https://blog.netspi.com/powershell-remoting-cheatsheet/

results matching ""

    No results matching ""