Skip to content

Instantly share code, notes, and snippets.

@0x09AL
0x09AL / gist:52236cc9356c2dccb2f42f83e6fc10bc
Created January 2, 2019 21:34 — forked from mekuls/gist:3102944
dcpromo.exe DCINSTALL example for new domain
[DCINSTALL]
InstallDNS=yes
NewDomain=forest
NewDomainDNSName=au.sky
DomainNetBiosName=au
ReplicaOrNewDomain=domain
ForestLevel=4
DomainLevel=4
DatabasePath=%systemroot%\ntds
LogPath=%systemroot%\ntds
# This idea originated from this blog post on Invoke DSC Resources directly:
# https://blogs.msdn.microsoft.com/powershell/2015/02/27/invoking-powershell-dsc-resources-directly/
<#
$MOFContents = @'
instance of MSFT_ScriptResource as $MSFT_ScriptResource1ref
{
ResourceID = "[Script]ScriptExample";
GetScript = "\"$(Get-Date): I am being GET\" | Out-File C:\\Windows\\Temp\\ScriptRun.txt -Append; return $True";
TestScript = "\"$(Get-Date): I am being TESTED\" | Out-File C:\\Windows\\Temp\\ScriptRun.txt -Append; return $True";
From: http://redteams.net/bookshelf/
Techie
Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp.
Social Engineering: The Art of Human Hacking by Christopher Hadnagy
Practical Lock Picking: A Physical Penetration Tester's Training Guide by Deviant Ollam
The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick
Hacking: The Art of Exploitation by Jon Erickson and Hacking Exposed by Stuart McClure and others.
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning by Fyodor
The Shellcoder's Handbook: Discovering and Exploiting Security Holes by several authors