Veilcat

Latest

  • OSCP 🐲

    Aug 30, 2025

    • pentesting
  • Medjed

    Aug 28, 2025

    • OSCP Note Template and Runbooks

      Aug 24, 2025

      Home

      ❯

      OSCP 🐲

      ❯

      OffSec Proving Grounds

      ❯

      Linux

      ❯

      Intermediate

      ❯

      OSCP Note Template and Runbooks

      ❯

      Privilege Escalation

      ❯

      Windows

      Windows

      Aug 20, 20251 min read

      systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
      whoami /priv
      net user
      ipconfig /all
      

      powerview.ps1

      cp $(locate powerview.ps1) .

      References

      • https://sirensecurity.io/blog/adref-active-directory-reference/
      • https://github.com/PowerShellMafia/PowerSploit
      • Conda Windows Methodology Video/Cheatsheet

      Graph View

      • powerview.ps1
      • References

      Created with Quartz v4.5.0 © 2025

      • LinkedIn
      • GitHub
      • TryHackMe
      • RSS