netsh interface ipv4 show config
Change name= to name of interface found above
netsh interface ipv4 set address name=Ethernet static 10.10.10.10 255.0.0.0 [optional IP of default gateway]
netsh interface ipv4 show config
# Similiar to unix command uptime | |
$bootTime = Get-CimInstance -ClassName win32_operatingsystem | Select-Object -ExpandProperty LastBootUpTime | |
$currentTime = Get-Date | |
$uptime = $currentTime - $bootTime | |
$days = $uptime.Days | |
$hours = $uptime.Hours | |
$minutes = $uptime.Minutes | |
$users = (quser).Count-1 | |
if ( $users -lt 0 ) { | |
$users = 0 |
install-windowsfeature -name WindowsPowerShellWebAccess -computername server1 -includemanagementtools -restart | |
install-pswawebapplication -usetestcertificate | |
add-pswaauthorizationrule -username * -computername * -configurationname * | |
set-item wsman:\localhost\Client\TrustedHosts -Value 'localhost,server1,10.10.10.1' -force | |
enable-psremoting -force | |
# Goto URL https://localhost/pswa | |
# Login username format | |
# localhost\theuser |
# myservice.service | |
[Unit] | |
Description=Python HTTP server /tmp port 4848 | |
Documentation=man systemd.service | |
After=network.target #myservice.service requires networking be up first | |
[Service] | |
User=sam | |
ExecStartPre=sh -c 'echo TRUE > /tmp/TRUE'#not required, just an example | |
ExecStart=/usr/bin/python3 -m http.server -d /tmp 4848 |
--- | |
# Remediate WinVerifyTrust Signature Validation Vulnerability | |
# URL https://msrc.microsoft.com/update-guide/vulnerability/CVE-2013-3900 | |
- hosts: win | |
tasks: | |
- name: Create registry path Wintrust | |
ansible.windows.win_regedit: | |
path: HKLM:\Software\Microsoft\Cryptography\Wintrust\ | |
- name: Create registry path Config |
# smb.conf | |
# Fix seLinux perms | |
# semanage fcontext -a -t samba_share_t '/etc/samba/smb.conf' | |
# restorecon -v '/etc/samba/smb.conf' | |
[global] | |
workgroup = SAMBA | |
server role = standalone server | |
restrict anonymous = 0 | |
guest account = ftp # map guest access to a low privileged user |
import re | |
import argparse | |
parser = argparse.ArgumentParser(description='Mimic Linux grep command for Python') | |
parser.add_argument('pattern', type=str, help='The pattern to search for') | |
parser.add_argument('file', type=str, help='The file to search in') | |
parser.add_argument('-i', '--ignore-case', action='store_true', help='Perform case-insensitive search') | |
args = parser.parse_args() |
From_Base64('A-Za-z0-9+/=',true,false) | |
Decode_text('UTF-16LE (1200)') | |
Regular_expression('User defined','[a-zA-Z0-9/+=]{30,}',true,true,false,false,false,false,'List matches') | |
From_Base64('A-Za-z0-9+/=',true,false) | |
Gunzip() | |
Regular_expression('User defined','[a-zA-Z0-9/+=]{30,}',true,true,false,false,false,false,'List matches') | |
From_Base64('A-Za-z0-9+/=',true,false) | |
XOR({'option':'Decimal','string':'35'},'Standard',false) |
import os | |
# mimic Unix tree command in python | |
# runs on Windows and Nix | |
# run from current directory for tree output | |
def tree(cwd): | |
print(f"+ {cwd}") | |
for root, dirs, files in os.walk(cwd): | |
level = root.replace(cwd, '').count(os.sep) | |
indent = ' ' * 4 * (level) | |
print(f"{indent}+ {os.path.basename(root)}/") |