Amnesiac
  • Welcome
  • Intended Usage
  • Get-Started
    • Quick Start
  • Main Menu
    • Available Commands
    • Main Menu Structure
    • [0] Scan Network for Admin Access
    • [1] Single-Listener (single target)
    • [2] Global-Listener (multiple targets)
    • [3] Scan Network for Listening Targets
    • Bookmarks
    • Payload Types
    • Payload Delivery
    • Serving Scripts
    • Sessions Display
    • Targets
    • Terminate Sessions
  • Sessions
    • Core Commands
      • Download
      • Exit
      • GListener
      • GLSet
      • Help
      • Kill
      • OneIsNone
      • Scramble
      • Sync
      • Toggle
      • Upload
    • System Commands
      • AV
      • Net
      • Process
      • Services
      • Sessions
      • Software
      • Startup
    • User Activity
      • ClearLogs
      • Clipboard
      • History and ClearHistory
      • Keylog and KeylogRead
      • ScreenShot and Screen4K
    • Scripts Loading
      • Mimi
      • Patch and PatchNet
      • PInject
      • PowerView
      • Rubeus
      • TLS
    • Local Actions
      • Ask4Creds
      • AutoMimi
      • CredMan
      • Dpapi
      • GetSystem
      • HashGrab
      • Hive
      • Kerb
      • Migrate
      • Monitor
    • Domain Actions
      • DCSync
      • CredValidate
      • Impersonation
      • LocalAdminAccess
      • PassSpray
      • Remoting
      • SessionHunter
  • Beware
    • Encryption
    • Non-Domain-Joined systems
    • SessionID 0
    • Timeouts
Powered by GitBook
On this page
  1. Main Menu

Payload Delivery

Payloads execution methods

Payloads generated with Amnesiac can be executed by simply pasting them into the command prompt or running them wherever the user has gained command execution on the target system.

There are various methods through which a user can gain command execution on a target system, and here are some examples:

  1. SMB Relay Attacks: Involves the use of ntlmrelayx to execute a command on a target system.

  2. Various forms of relay attacks can be used to execute commands on target systems.

  3. Pass-the-Hash: Execute commands on a targets by leveraging pass-the-hash attacks.

  4. MitM6 Attacks: Involves the use of ntlmrelayx to execute commands on target systems

  5. Phishing Attacks: Payloads can be delivered through phishing attacks that use VBA, Macros or other malicious file delivery techniques.

  6. Payloads can be embedded into executables.

  7. MS SQL Command Execution

  8. Group Policy Objects (GPOs)

  9. Local PrivEsc: Elevating privileges locally to obtain an elevated session on the local system.

These are just some examples. Payloads generated by Amnesiac can be executed in various scenarios to establish sessions on target systems.

Last updated 1 year ago