System/Kernel


*evil-winrm* ps c:\Users\henry.vinson_adm\Documents> systeminfo ; Get-ComputerInfo
program 'systeminfo.exe' failed to run: Access is deniedAt line:1 char:1
+ systeminfo ; Get-ComputerInfo
+ ~~~~~~~~~~.
at line:1 char:1
+ systeminfo ; Get-ComputerInfo
+ ~~~~~~~~~~
    + categoryinfo          : ResourceUnavailable: (:) [], ApplicationFailedException
    + fullyqualifiederrorid : NativeCommandFailed
 
 
windowsbuildlabex                                       : 14393.4283.amd64fre.rs1_release.210303-1802
windowscurrentversion                                   : 6.3
windowseditionid                                        : ServerStandard
windowsinstallationtype                                 : Server Core
windowsinstalldatefromregistry                          : 9/24/2020 6:54:17 AM
windowsproductid                                        : 00376-30821-30176-AA213
windowsproductname                                      : Windows Server 2016 Standard
windowsregisteredorganization                           : Managed by Terraform
windowsregisteredowner                                  : Administrator
windowssystemroot                                       : C:\Windows
osserverlevel                                           : ServerCore
timezone                                                : (UTC+00:00) Dublin, Edinburgh, Lisbon, London
powerplatformrole                                       : Desktop
deviceguardsmartstatus                                  : Off

Windows Server 2016 Standard 6.3 Managed by Terraform 14393.4283.amd64fre.rs1_release.210303-1802

Networks


*Evil-WinRM* PS C:\Users\henry.vinson_adm\Documents> ipconfig /all ; arp -a
 
Windows IP Configuration
 
   Host Name . . . . . . . . . . . . : apt
   Primary Dns Suffix  . . . . . . . : htb.local
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : htb.local
                                       htb
 
Ethernet adapter Ethernet:
 
   Connection-specific DNS Suffix  . : htb
   Description . . . . . . . . . . . : vmxnet3 Ethernet Adapter
   Physical Address. . . . . . . . . : 00-50-56-B9-47-0D
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : dead:beef::24b(Preferred)
   Lease Obtained. . . . . . . . . . : Sunday, October 22, 2023 1:26:25 PM
   Lease Expires . . . . . . . . . . : Monday, October 23, 2023 12:26:25 AM
   IPv6 Address. . . . . . . . . . . : dead:beef::183f:801c:80e2:9c63(Preferred)
   IPv6 Address. . . . . . . . . . . : dead:beef::b885:d62a:d679:573f(Preferred)
   Link-local IPv6 Address . . . . . : fe80::183f:801c:80e2:9c63%5(Preferred)
   IPv4 Address. . . . . . . . . . . : 10.10.10.213(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : dead:beef::1
                                       fe80::250:56ff:feb9:d784%5
                                       10.10.10.2
   DHCPv6 IAID . . . . . . . . . . . : 50352214
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-2C-C6-CD-0D-00-50-56-B9-47-0D
   DNS Servers . . . . . . . . . . . : 127.0.0.1
   NetBIOS over Tcpip. . . . . . . . : Enabled
   Connection-specific DNS Suffix Search List :
                                       htb
 
Interface: 10.10.10.213 --- 0x5
  Internet Address      Physical Address      Type
  10.10.10.2            00-50-56-b9-d7-84     dynamic
  10.10.10.255          ff-ff-ff-ff-ff-ff     static
 
*Evil-WinRM* PS C:\Users\henry.vinson_adm\Documents> netstat -ano | Select-String LIST
 
  TCP    0.0.0.0:80             0.0.0.0:0              LISTENING       4
  TCP    0.0.0.0:88             0.0.0.0:0              LISTENING       592
  TCP    0.0.0.0:135            0.0.0.0:0              LISTENING       820
  TCP    0.0.0.0:389            0.0.0.0:0              LISTENING       592
  TCP    0.0.0.0:445            0.0.0.0:0              LISTENING       4
  TCP    0.0.0.0:464            0.0.0.0:0              LISTENING       592
  TCP    0.0.0.0:593            0.0.0.0:0              LISTENING       820
  TCP    0.0.0.0:636            0.0.0.0:0              LISTENING       592
  TCP    0.0.0.0:3268           0.0.0.0:0              LISTENING       592
  TCP    0.0.0.0:3269           0.0.0.0:0              LISTENING       592
  TCP    0.0.0.0:5985           0.0.0.0:0              LISTENING       4
  TCP    0.0.0.0:9389           0.0.0.0:0              LISTENING       1844
  TCP    0.0.0.0:47001          0.0.0.0:0              LISTENING       4
  TCP    0.0.0.0:49664          0.0.0.0:0              LISTENING       460
  TCP    0.0.0.0:49665          0.0.0.0:0              LISTENING       936
  TCP    0.0.0.0:49666          0.0.0.0:0              LISTENING       984
  TCP    0.0.0.0:49667          0.0.0.0:0              LISTENING       592
  TCP    0.0.0.0:49669          0.0.0.0:0              LISTENING       592
  TCP    0.0.0.0:49670          0.0.0.0:0              LISTENING       592
  TCP    0.0.0.0:49675          0.0.0.0:0              LISTENING       584
  TCP    0.0.0.0:49695          0.0.0.0:0              LISTENING       1936
  TCP    0.0.0.0:58348          0.0.0.0:0              LISTENING       1864
  TCP    10.10.10.213:53        0.0.0.0:0              LISTENING       1936
  TCP    10.10.10.213:139       0.0.0.0:0              LISTENING       4
  TCP    127.0.0.1:53           0.0.0.0:0              LISTENING       1936
  TCP    [::]:80                [::]:0                 LISTENING       4
  TCP    [::]:88                [::]:0                 LISTENING       592
  TCP    [::]:135               [::]:0                 LISTENING       820
  TCP    [::]:389               [::]:0                 LISTENING       592
  TCP    [::]:445               [::]:0                 LISTENING       4
  TCP    [::]:464               [::]:0                 LISTENING       592
  TCP    [::]:593               [::]:0                 LISTENING       820
  TCP    [::]:636               [::]:0                 LISTENING       592
  TCP    [::]:3268              [::]:0                 LISTENING       592
  TCP    [::]:3269              [::]:0                 LISTENING       592
  TCP    [::]:5985              [::]:0                 LISTENING       4
  TCP    [::]:9389              [::]:0                 LISTENING       1844
  TCP    [::]:47001             [::]:0                 LISTENING       4
  TCP    [::]:49664             [::]:0                 LISTENING       460
  TCP    [::]:49665             [::]:0                 LISTENING       936
  TCP    [::]:49666             [::]:0                 LISTENING       984
  TCP    [::]:49667             [::]:0                 LISTENING       592
  TCP    [::]:49669             [::]:0                 LISTENING       592
  TCP    [::]:49670             [::]:0                 LISTENING       592
  TCP    [::]:49675             [::]:0                 LISTENING       584
  TCP    [::]:49695             [::]:0                 LISTENING       1936
  TCP    [::]:58348             [::]:0                 LISTENING       1864
  TCP    [::1]:53               [::]:0                 LISTENING       1936
  TCP    [dead:beef::24b]:53    [::]:0                 LISTENING       1936
  TCP    [dead:beef::183f:801c:80e2:9c63]:53  [::]:0                 LISTENING       1936
  TCP    [dead:beef::b885:d62a:d679:573f]:53  [::]:0                 LISTENING       1936
  TCP    [fe80::183f:801c:80e2:9c63%5]:53  [::]:0                 LISTENING       1936

Users & Groups


*evil-winrm* ps c:\Users\henry.vinson_adm\Documents> net user ; net user /DOMAIN
 
User accounts for \\
 
-------------------------------------------------------------------------------
Administrator            DefaultAccount           Guest
henry.vinson             henry.vinson_adm         krbtgt
The command completed with one or more errors.
 
 
User accounts for \\
 
-------------------------------------------------------------------------------
Administrator            DefaultAccount           Guest
henry.vinson             henry.vinson_adm         krbtgt
The command completed with one or more errors.
*evil-winrm* ps c:\Users\henry.vinson_adm\Documents> net localgroup ; net group /DOMAIN
 
Aliases for \\APT
 
-------------------------------------------------------------------------------
*Access Control Assistance Operators
*Account Operators
*Administrators
*Allowed RODC Password Replication Group
*apt-Admins
*Backup Operators
*Cert Publishers
*Certificate Service DCOM Access
*Cryptographic Operators
*Denied RODC Password Replication Group
*Distributed COM Users
*DnsAdmins
*Event Log Readers
*Guests
*Hyper-V Administrators
*IIS_IUSRS
*Incoming Forest Trust Builders
*Network Configuration Operators
*Performance Log Users
*Performance Monitor Users
*Pre-Windows 2000 Compatible Access
*Print Operators
*RAS and IAS Servers
*RDS Endpoint Servers
*RDS Management Servers
*RDS Remote Access Servers
*Remote Desktop Users
*Remote Management Users
*Replicator
*Server Operators
*Storage Replica Administrators
*System Managed Accounts Group
*Terminal Server License Servers
*Users
*Windows Authorization Access Group
The command completed successfully.
 
 
Group Accounts for \\
 
-------------------------------------------------------------------------------
*Cloneable Domain Controllers
*DnsUpdateProxy
*Domain Admins
*Domain Computers
*Domain Controllers
*Domain Guests
*Domain Users
*Enterprise Admins
*Enterprise Key Admins
*Enterprise Read-only Domain Controllers
*Group Policy Creator Owners
*Key Admins
*Protected Users
*Read-only Domain Controllers
*Schema Admins
The command completed with one or more errors.

apt-Admins

Processes


*Evil-WinRM* PS C:\Users\henry.vinson_adm\Documents> ps
 
Handles  NPM(K)    PM(K)      WS(K)     CPU(s)     Id  SI ProcessName
-------  ------    -----      -----     ------     --  -- -----------
     39       4     1544       2580              3764   1 cmd
     94       8     1312       1172               736   0 conhost
     94       8     4964       9544       0.03   3228   0 conhost
    110       9     5344      11324              3700   1 conhost
    301      13     1864       4208               380   0 csrss
    155       9     1796       8284               468   1 csrss
    350      31    14168      22704              1864   0 dfsrs
    154      12     2172       7408              1672   0 dfssvc
    215      13     3556      12412              2556   0 dllhost
    351      30     8008      10916              1936   0 dns
    140      11     4008       9264              1984   0 gisvc
      0       0        0          4                 0   0 Idle
    124      12     1836       5712              1992   0 ismserv
   1958     217    54212      71068               592   0 lsass
    517      30    37788      48888              1844   0 Microsoft.ActiveDirectory.WebServices
    191      13     2604       9772              2672   0 msdtc
    471      73   204720     159372               364   0 MsMpEng
    181      39     3252       9480              2788   0 NisSrv
    457      31   111328      43756              1488   0 powershell
    301      11     4084       9988               584   0 services
     51       2      360       1216               296   0 smss
    957      43     9388      24300               400   0 svchost
    379      33    11904      17116               692   0 svchost
    333      13     2532       8976               764   0 svchost
    422      18     3112       9020               820   0 svchost
    604      21     4896      12476               928   0 svchost
    401      20    10240      17192               936   0 svchost
    228      15     3100      12180               976   0 svchost
    754      31    16760      33196               984   0 svchost
    133       9     1748       7100              1288   0 svchost
    198      11     2044       8172              1704   0 svchost
    265      16     4740      14228              1836   0 svchost
    137      11     3588      10480              1852   0 svchost
    201      14     4532      11532              2044   0 svchost
    104       7     2232       8216              3860   0 svchost
    244      19     7564      13268              3920   0 svchost
    764       0      128        140                 4   0 System
    164      12     1764       9288               996   1 taskhostw
     98       7     1132       6372              2308   0 unsecapp
    195      16     2300      10756              2316   0 vds
    147      12     3104      10376              2024   0 VGAuthService
     71       7     1208       5556              3564   1 vm3dservice
    329      22     8988      22016               864   0 vmtoolsd
    171      15     3324      13132              3940   1 vmtoolsd
     92       8      924       4940               460   0 wininit
    190      10     1976       9464               536   1 winlogon
    419      16     8212      18420              1520   0 WmiPrvSE
    238      13    13808      21276              2892   0 WmiPrvSE
   1217      31    54000      77940       0.95   1888   0 wsmprovhost

Tasks


*evil-winrm* ps c:\Users\henry.vinson_adm\Documents> Get-ScheduledTask | where {$_.TaskPath -notlike "\Microsoft*" } | ft TaskName,TaskPath,State
Cannot connect to CIM server. Access denied 
at line:1 char:1
+ Get-ScheduledTask | where {$_.TaskPath -notlike "\Microsoft*" } | ft  ...
+ ~~~~~~~~~~~~~~~~~
    + categoryinfo          : ResourceUnavailable: (MSFT_ScheduledTask:String) [Get-ScheduledTask], CimJobException
    + fullyqualifiederrorid : CimJob_BrokenCimSession,Get-ScheduledTask
 
 
*evil-winrm* ps c:\Users\henry.vinson_adm\Documents> cmd /c schtasks /QUERY /FO TABLE | findstr /v /i "\Microsoft" | findstr /v /i "access level" | findstr /v /i "system32"
cmd.exe : Access is denied.
    + categoryinfo          : NotSpecified: (Access is denied.:String) [], RemoteException
    + fullyqualifiederrorid : NativeCommandError

Services


*Evil-WinRM* PS C:\Users\henry.vinson_adm\Documents> services
 
Path                                                                           Privileges Service          
----                                                                           ---------- -------          
C:\Windows\ADWS\Microsoft.ActiveDirectory.WebServices.exe                           False ADWS             
"C:\Program Files\VMware\VMware Tools\gisvc.exe"                                    False GISvc            
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe                        True NetTcpPortSharing
C:\Windows\SysWow64\perfhost.exe                                                    False PerfHost         
C:\Windows\servicing\TrustedInstaller.exe                                           False TrustedInstaller 
"C:\Program Files\VMware\VMware Tools\VMware VGAuth\VGAuthService.exe"              False VGAuthService    
"C:\Program Files\VMware\VMware Tools\vmtoolsd.exe"                                 False VMTools          
"C:\ProgramData\Microsoft\Windows Defender\platform\4.18.2102.4-0\NisSrv.exe"        True WdNisSvc         
"C:\ProgramData\Microsoft\Windows Defender\platform\4.18.2102.4-0\MsMpEng.exe"       True WinDefend        

Firewall & AV


*evil-winrm* ps c:\Users\henry.vinson_adm\Documents> cmd /c netsh firewall show config 
 
domain profile configuration (current):
-------------------------------------------------------------------
Operational mode                  = Enable
Exception mode                    = Enable
Multicast/broadcast response mode = Enable
Notification mode                 = Disable
 
service configuration for domain profile:
Mode     Customized  Name
-------------------------------------------------------------------
Enable   No          File and Printer Sharing
 
allowed programs configuration for domain profile:
Mode     Traffic direction    Name / Program
-------------------------------------------------------------------
 
port configuration for domain profile:
Port   Protocol  Mode    Traffic direction     Name
-------------------------------------------------------------------
80     TCP       Enable  Inbound               http
135    TCP       Enable  Inbound               http
135    TCP       Enable  Inbound               http
80     TCP       Enable  Inbound               http
135    TCP       Enable  Inbound               http
135    TCP       Enable  Inbound               http
5985   TCP       Enable  Inbound               Firewall Rule for WinRM
135    TCP       Enable  Inbound               Firewall Rule for RPC
445    TCP       Enable  Inbound               Firewall Rule for SMB
 
icmp configuration for domain profile:
Mode     Type  Description
-------------------------------------------------------------------
Enable   2     Allow outbound packet too big
Enable   8     Allow inbound echo request
 
standard profile configuration:
-------------------------------------------------------------------
Operational mode                  = Enable
Exception mode                    = Enable
Multicast/broadcast response mode = Enable
Notification mode                 = Disable
 
service configuration for standard profile:
Mode     Customized  Name
-------------------------------------------------------------------
Enable   No          File and Printer Sharing
 
allowed programs configuration for standard profile:
Mode     Traffic direction    Name / Program
-------------------------------------------------------------------
 
port configuration for standard profile:
Port   Protocol  Mode    Traffic direction     Name
-------------------------------------------------------------------
80     TCP       Enable  Inbound               http
135    TCP       Enable  Inbound               http
135    TCP       Enable  Inbound               http
80     TCP       Enable  Inbound               http
135    TCP       Enable  Inbound               http
135    TCP       Enable  Inbound               http
5985   TCP       Enable  Inbound               Firewall Rule for WinRM
135    TCP       Enable  Inbound               Firewall Rule for RPC
445    TCP       Enable  Inbound               Firewall Rule for SMB
 
icmp configuration for standard profile:
Mode     Type  Description
-------------------------------------------------------------------
Enable   2     Allow outbound packet too big
Enable   8     Allow inbound echo request
 
log configuration:
-------------------------------------------------------------------
file location   = c:\Windows\system32\LogFiles\Firewall\pfirewall.log
Max file size   = 4096 KB
Dropped packets = Disable
Connections     = Disable
 
important: Command executed successfully.
However, "netsh firewall" is deprecated;
use "netsh advfirewall firewall" instead.
For more information on using "netsh advfirewall firewall" commands
instead of "netsh firewall", see KB article 947709
at http://go.microsoft.com/fwlink/?linkid=121488 .

Firewall is heavily enabled as expected

*evil-winrm* ps c:\Users\henry.vinson_adm\Documents> Get-MpComputerStatus ; Get-MpPreference | Select-Object -Property ExclusionPath
Cannot connect to CIM server. Access denied 
at line:1 char:1
+ Get-MpComputerStatus ; Get-MpPreference | Select-Object -Property Exc ...
+ ~~~~~~~~~~~~~~~~~~~~
    + categoryinfo          : ResourceUnavailable: (MSFT_MpComputerStatus:String) [Get-MpComputerStatus], CimJobException
    + fullyqualifiederrorid : CimJob_BrokenCimSession,Get-MpComputerStatus
Cannot connect to CIM server. Access denied 
at line:1 char:24
+ Get-MpComputerStatus ; Get-MpPreference | Select-Object -Property Exc ...
+                        ~~~~~~~~~~~~~~~~
    + categoryinfo          : ResourceUnavailable: (MSFT_MpPreference:String) [Get-MpPreference], CimJobException
    + fullyqualifiederrorid : CimJob_BrokenCimSession,Get-MpPreference

Session Architecture


*Evil-WinRM* PS C:\Users\henry.vinson_adm\Documents> [Environment]::Is64BitProcess
True

Installed .NET Frameworks


*evil-winrm* ps c:\Users\henry.vinson_adm\Documents> cmd /c dir /s C:\Windows\Microsoft.NET\Framework\msbuild
 Volume in drive C is System
 Volume Serial Number is BF99-DE3E
 
 directory of c:\Windows\Microsoft.NET\Framework\v4.0.30319
 
07/16/2016  02:18 PM    <DIR>          MSBuild
               0 File(s)              0 bytes
 
     total files listed:
               0 File(s)              0 bytes
               1 Dir(s)  10,724,515,840 bytes free
*evil-winrm* ps c:\Users\henry.vinson_adm\Documents> cmd /c dir /A:D C:\Windows\Microsoft.NET\Framework
 Volume in drive C is System
 Volume Serial Number is BF99-DE3E
 
 directory of c:\Windows\Microsoft.NET\Framework
 
07/16/2016  02:18 PM    <DIR>          .
07/16/2016  02:18 PM    <DIR>          ..
09/24/2020  09:10 AM    <DIR>          v1.0.3705
07/16/2016  02:18 PM    <DIR>          v1.1.4322
07/16/2016  02:18 PM    <DIR>          v2.0.50727
10/22/2023  01:35 PM    <DIR>          v4.0.30319
               0 File(s)              0 bytes
               6 Dir(s)  10,724,515,840 bytes free
*evil-winrm* ps c:\Users\henry.vinson_adm\Documents> cmd /c reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP"
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\CDF
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4.0
*evil-winrm* ps c:\Users\henry.vinson_adm\Documents> cmd /c reg query "HKLM\SOFTWARE\Microsoft\Net Framework Setup\NDP" /s
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\CDF
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\CDF\v4.0
    HttpNamespaceReservationInstalled    REG_DWORD    0x1
    NetTcpPortSharingInstalled    REG_DWORD    0x1
    NonHttpActivationInstalled    REG_DWORD    0x1
    smsvchostpath    reg_sz    c:\Windows\Microsoft.NET\Framework64\v4.0.30319\
    WMIInstalled    REG_DWORD    0x1
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Client
    CBS    REG_DWORD    0x1
    Install    REG_DWORD    0x1
    installpath    reg_sz    c:\Windows\Microsoft.NET\Framework64\v4.0.30319\
    Release    REG_DWORD    0x60632
    Servicing    REG_DWORD    0x0
    TargetVersion    REG_SZ    4.0.0
    Version    REG_SZ    4.6.01586
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Client\1033
    CBS    REG_DWORD    0x1
    Install    REG_DWORD    0x1
    Release    REG_DWORD    0x60632
    Servicing    REG_DWORD    0x0
    TargetVersion    REG_SZ    4.0.0
    Version    REG_SZ    4.6.01586
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Full
    CBS    REG_DWORD    0x1
    Install    REG_DWORD    0x1
    installpath    reg_sz    c:\Windows\Microsoft.NET\Framework64\v4.0.30319\
    Release    REG_DWORD    0x60632
    Servicing    REG_DWORD    0x0
    TargetVersion    REG_SZ    4.0.0
    Version    REG_SZ    4.6.01586
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Full\1033
    CBS    REG_DWORD    0x1
    Install    REG_DWORD    0x1
    Release    REG_DWORD    0x60632
    Servicing    REG_DWORD    0x0
    TargetVersion    REG_SZ    4.0.0
    Version    REG_SZ    4.6.01586
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4.0
    (Default)    REG_SZ    deprecated
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4.0\Client
    Install    REG_DWORD    0x1
    Version    REG_SZ    4.0.0.0

.NET 4.6.01586