From 9172f51a5f4bf7c64469fe36df95a5b9f521edd0 Mon Sep 17 00:00:00 2001 From: Kevin Robertson Date: Tue, 19 Jan 2016 21:27:37 -0500 Subject: Added p0wnedShell link Added p0wnedShell link to the included in section. Removed the SMB relay note to sync with Inveigh.ps1 notes. --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 561e069..0c45d4c 100644 --- a/README.md +++ b/README.md @@ -14,7 +14,6 @@ Tested minimums are PowerShell 2.0 and .NET 3.5 7. Kerberos should downgrade for SMB authentication due to spoofed hostnames not being valid in DNS. 8. Ensure that the LMMNR,NBNS,SMB,HTTP ports are open within any local firewall on the host system. 9. If you copy/paste challenge/response captures from output window for password cracking, remove carriage returns. -10. SMB relay support is experimental at this point, use caution if employing on a pen test. # Usage Obtain an elevated administrator or SYSTEM shell and use a method to load the module @@ -64,6 +63,7 @@ Stop-Inveigh - Stop all running Inveigh functions # Included In PowerShell Empire - https://github.com/PowerShellEmpire/Empire PS>Attack - https://github.com/jaredhaight/psattack +p0wnedShell - https://github.com/Cn33liz/p0wnedShell # Special Thanks Anyone that posted .net packet sniffing examples. -- cgit v1.2.3