System/Kernel
*evil-winrm* ps c:\Users\matthew\Documents> systeminfo ; Get-ComputerInfo
program 'systeminfo.exe' failed to run: Access is denied At line:1 char:1
+ systeminfo ; Get-ComputerInfo
+ ~~~~~~~~~~.
at line:1 char:1
+ systeminfo ; Get-ComputerInfo
+ ~~~~~~~~~~
+ categoryinfo : ResourceUnavailable: (:) [], ApplicationFailedException
+ fullyqualifiederrorid : NativeCommandFailed
windowsbuildlabex : 17763.1.amd64fre.rs5_release.180914-1434
windowscurrentversion : 6.3
windowseditionid : ServerStandard
windowsinstallationtype : Server
windowsinstalldatefromregistry : 4/10/2020 5:48:06 PM
windowsproductid : 00429-00521-62775-AA477
windowsproductname : Windows Server 2019 Standard
windowsregisteredorganization :
windowsregisteredowner : Windows User
windowssystemroot : C:\Windows
windowsversion : 1809
osserverlevel : FullServer
keyboardlayout :
timezone : (UTC-08:00) Pacific Time (US & Canada)
logonserver :
powerplatformrole : Desktop
deviceguardsmartstatus : Off
*evil-winrm* ps c:\Users\matthew\Documents> cmd /c ver
Microsoft Windows [Version 10.0.17763.4010]
Windows Server 2019 Standard
10.0.17763.4010
FullServer
Desktop
Networks
*Evil-WinRM* PS C:\Users\matthew\Documents> ipconfig /all ; arp -a ; print route
Windows IP Configuration
Host Name . . . . . . . . . . . . : DC
Primary Dns Suffix . . . . . . . : cerberus.local
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : cerberus.local
htb
Ethernet adapter vEthernet (Switch1):
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Hyper-V Virtual Ethernet Adapter
Physical Address. . . . . . . . . : 00-15-5D-5F-E8-00
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::e225:edaa:5112:dfc3%6(Preferred)
IPv4 Address. . . . . . . . . . . : 172.16.22.1(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.240
Default Gateway . . . . . . . . . :
DHCPv6 IAID . . . . . . . . . . . : 452990301
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-2B-5F-1B-88-00-50-56-B4-33-03
DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1
fec0:0:0:ffff::2%1
fec0:0:0:ffff::3%1
NetBIOS over Tcpip. . . . . . . . : Enabled
Ethernet adapter Ethernet0 3:
Connection-specific DNS Suffix . : htb
Description . . . . . . . . . . . : vmxnet3 Ethernet Adapter #2
Physical Address. . . . . . . . . : 00-50-56-B9-A9-A0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
IPv6 Address. . . . . . . . . . . : dead:beef::138(Preferred)
Lease Obtained. . . . . . . . . . : Tuesday, January 16, 2024 10:59:40 PM
Lease Expires . . . . . . . . . . : Wednesday, January 17, 2024 10:29:40 AM
IPv6 Address. . . . . . . . . . . : dead:beef::c349:4d0f:4db0:880(Preferred)
Link-local IPv6 Address . . . . . : fe80::2df8:1fb:a85b:f52d%5(Preferred)
IPv4 Address. . . . . . . . . . . : 10.10.11.205(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : fe80::250:56ff:feb9:6c92%5
10.10.10.2
DHCPv6 IAID . . . . . . . . . . . : 486559830
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-2B-5F-1B-88-00-50-56-B4-33-03
DNS Servers . . . . . . . . . . . : 127.0.0.1
NetBIOS over Tcpip. . . . . . . . : Enabled
Connection-specific DNS Suffix Search List :
htb
Interface: 10.10.11.205 --- 0x5
Internet Address Physical Address Type
10.10.10.2 00-50-56-b9-6c-92 dynamic
10.10.11.255 ff-ff-ff-ff-ff-ff static
224.0.0.22 01-00-5e-00-00-16 static
224.0.0.251 01-00-5e-00-00-fb static
224.0.0.252 01-00-5e-00-00-fc static
Interface: 172.16.22.1 --- 0x6
Internet Address Physical Address Type
172.16.22.2 00-15-5d-5f-e8-01 dynamic
172.16.22.15 ff-ff-ff-ff-ff-ff static
224.0.0.22 01-00-5e-00-00-16 static
224.0.0.251 01-00-5e-00-00-fb static
224.0.0.252 01-00-5e-00-00-fc static
Unable to initialize device PRN
Hyper-V Virtual Ethernet Adapter 172.16.22.1
*Evil-WinRM* PS C:\Users\matthew\Documents> netstat -ano | Select-String LIST
TCP 0.0.0.0:80 0.0.0.0:0 LISTENING 4
TCP 0.0.0.0:88 0.0.0.0:0 LISTENING 696
TCP 0.0.0.0:135 0.0.0.0:0 LISTENING 948
TCP 0.0.0.0:389 0.0.0.0:0 LISTENING 696
TCP 0.0.0.0:443 0.0.0.0:0 LISTENING 4
TCP 0.0.0.0:445 0.0.0.0:0 LISTENING 4
TCP 0.0.0.0:464 0.0.0.0:0 LISTENING 696
TCP 0.0.0.0:593 0.0.0.0:0 LISTENING 948
TCP 0.0.0.0:636 0.0.0.0:0 LISTENING 696
TCP 0.0.0.0:808 0.0.0.0:0 LISTENING 6892
TCP 0.0.0.0:1500 0.0.0.0:0 LISTENING 6892
TCP 0.0.0.0:1501 0.0.0.0:0 LISTENING 6892
TCP 0.0.0.0:2179 0.0.0.0:0 LISTENING 3444
TCP 0.0.0.0:3268 0.0.0.0:0 LISTENING 696
TCP 0.0.0.0:3269 0.0.0.0:0 LISTENING 696
TCP 0.0.0.0:5985 0.0.0.0:0 LISTENING 4
TCP 0.0.0.0:8888 0.0.0.0:0 LISTENING 5524
TCP 0.0.0.0:9251 0.0.0.0:0 LISTENING 5524
TCP 0.0.0.0:9389 0.0.0.0:0 LISTENING 2544
TCP 0.0.0.0:47001 0.0.0.0:0 LISTENING 4
TCP 0.0.0.0:49664 0.0.0.0:0 LISTENING 532
TCP 0.0.0.0:49665 0.0.0.0:0 LISTENING 1232
TCP 0.0.0.0:49666 0.0.0.0:0 LISTENING 1604
TCP 0.0.0.0:49667 0.0.0.0:0 LISTENING 696
TCP 0.0.0.0:49689 0.0.0.0:0 LISTENING 696
TCP 0.0.0.0:49690 0.0.0.0:0 LISTENING 696
TCP 0.0.0.0:49898 0.0.0.0:0 LISTENING 696
TCP 0.0.0.0:49915 0.0.0.0:0 LISTENING 668
TCP 0.0.0.0:49920 0.0.0.0:0 LISTENING 2096
TCP 0.0.0.0:49934 0.0.0.0:0 LISTENING 3156
TCP 0.0.0.0:49961 0.0.0.0:0 LISTENING 3112
TCP 10.10.11.205:53 0.0.0.0:0 LISTENING 3156
TCP 10.10.11.205:139 0.0.0.0:0 LISTENING 4
TCP 127.0.0.1:53 0.0.0.0:0 LISTENING 3156
TCP 127.0.0.1:32000 0.0.0.0:0 LISTENING 2548
TCP 127.0.0.1:33308 0.0.0.0:0 LISTENING 2640
TCP 127.0.0.1:49924 0.0.0.0:0 LISTENING 5524
TCP 172.16.22.1:53 0.0.0.0:0 LISTENING 3156
TCP 172.16.22.1:139 0.0.0.0:0 LISTENING 4
TCP [::]:80 [::]:0 LISTENING 4
TCP [::]:88 [::]:0 LISTENING 696
TCP [::]:135 [::]:0 LISTENING 948
TCP [::]:389 [::]:0 LISTENING 696
TCP [::]:443 [::]:0 LISTENING 4
TCP [::]:445 [::]:0 LISTENING 4
TCP [::]:464 [::]:0 LISTENING 696
TCP [::]:593 [::]:0 LISTENING 948
TCP [::]:636 [::]:0 LISTENING 696
TCP [::]:808 [::]:0 LISTENING 6892
TCP [::]:1500 [::]:0 LISTENING 6892
TCP [::]:1501 [::]:0 LISTENING 6892
TCP [::]:2179 [::]:0 LISTENING 3444
TCP [::]:3268 [::]:0 LISTENING 696
TCP [::]:3269 [::]:0 LISTENING 696
TCP [::]:5985 [::]:0 LISTENING 4
TCP [::]:9389 [::]:0 LISTENING 2544
TCP [::]:47001 [::]:0 LISTENING 4
TCP [::]:49664 [::]:0 LISTENING 532
TCP [::]:49665 [::]:0 LISTENING 1232
TCP [::]:49666 [::]:0 LISTENING 1604
TCP [::]:49667 [::]:0 LISTENING 696
TCP [::]:49689 [::]:0 LISTENING 696
TCP [::]:49690 [::]:0 LISTENING 696
TCP [::]:49898 [::]:0 LISTENING 696
TCP [::]:49915 [::]:0 LISTENING 668
TCP [::]:49920 [::]:0 LISTENING 2096
TCP [::]:49934 [::]:0 LISTENING 3156
TCP [::]:49961 [::]:0 LISTENING 3112
TCP [::1]:53 [::]:0 LISTENING 3156
TCP [::1]:33308 [::]:0 LISTENING 2640
TCP [dead:beef::138]:53 [::]:0 LISTENING 3156
TCP [dead:beef::c349:4d0f:4db0:880]:53 [::]:0 LISTENING 3156
TCP [fe80::2df8:1fb:a85b:f52d%5]:53 [::]:0 LISTENING 3156
TCP [fe80::e225:edaa:5112:dfc3%6]:53 [::]:0 LISTENING 3156
0.0.0.0:808
0.0.0.0:1500
0.0.0.0:1501
0.0.0.0:2179
0.0.0.0:8888
0.0.0.0:9251
Users & Groups
*evil-winrm* ps c:\Users\matthew\Documents> net users ; ls C:\Users
User accounts for \\
-------------------------------------------------------------------------------
Administrator Guest krbtgt
matthew
The command completed with one or more errors.
directory: C:\Users
Mode LastWriteTime Length Name
---- ------------- ------ ----
d----- 1/30/2023 2:44 AM adfs_svc$
d----- 1/30/2023 4:14 AM adfs_svc$.CERBERUS
d----- 11/29/2022 4:24 AM Administrator
d----- 1/22/2023 11:22 AM matthew
d-r--- 4/10/2020 10:49 AM Public
adfs_svc$
adfs_svc$.CERBERUS
*evil-winrm* ps c:\Users\matthew\Documents> net localgroup ; net group /DOMAIN
Aliases for \\DC
-------------------------------------------------------------------------------
*Access Control Assistance Operators
*Account Operators
*Administrators
*Allowed RODC Password Replication Group
*Backup Operators
*Cert Publishers
*Certificate Service DCOM Access
*Cryptographic Operators
*Denied RODC Password Replication Group
*Distributed COM Users
*DnsAdmins
*Event Log Readers
*Guests
*Hyper-V Administrators
*IIS_IUSRS
*Incoming Forest Trust Builders
*Network Configuration Operators
*Performance Log Users
*Performance Monitor Users
*Pre-Windows 2000 Compatible Access
*Print Operators
*RAS and IAS Servers
*RDS Endpoint Servers
*RDS Management Servers
*RDS Remote Access Servers
*Remote Desktop Users
*Remote Management Users
*Replicator
*Server Operators
*Storage Replica Administrators
*Terminal Server License Servers
*Users
*Windows Authorization Access Group
The command completed successfully.
Group Accounts for \\
-------------------------------------------------------------------------------
*Cloneable Domain Controllers
*DnsUpdateProxy
*Domain Admins
*Domain Computers
*Domain Controllers
*Domain Guests
*Domain Users
*Enterprise Admins
*Enterprise Key Admins
*Enterprise Read-only Domain Controllers
*Group Policy Creator Owners
*Key Admins
*Protected Users
*Read-only Domain Controllers
*Schema Admins
The command completed with one or more errors.
Processes
*Evil-WinRM* PS C:\Users\matthew\Documents> cmd /c tasklist /svc
cmd.exe : ERROR: Access denied
+ CategoryInfo : NotSpecified: (ERROR: Access denied:String) [], RemoteException
+ FullyQualifiedErrorId : NativeCommandError
*Evil-WinRM* PS C:\Users\matthew\Documents> ps
Handles NPM(K) PM(K) WS(K) CPU(s) Id SI ProcessName
------- ------ ----- ----- ------ -- -- -----------
399 34 13064 22316 2096 0 certsrv
81 5 2280 3916 1952 0 cmd
160 9 6668 12876 3640 0 conhost
139 8 6452 10996 5808 0 conhost
154 9 6672 12800 0.06 6780 0 conhost
604 23 2532 5088 424 0 csrss
177 14 1848 4512 548 1 csrss
400 33 16624 23556 3112 0 dfsrs
159 8 1940 6268 3324 0 dfssvc
265 14 3932 13860 4332 0 dllhost
10403 7411 129904 128300 3156 0 dns
532 22 23528 41468 448 1 dwm
54 6 1624 4400 4032 1 fontdrvhost
54 7 1652 4436 4360 0 fontdrvhost
196 10 1652 1628 1856 0 GoogleCrashHandler
174 9 1736 1332 1884 0 GoogleCrashHandler64
231 14 2260 3868 1616 0 GoogleUpdate
0 0 56 8 0 0 Idle
206 16 6520 15660 3272 0 inetinfo
139 12 1952 5776 3244 0 ismserv
1947 69 318868 282160 5524 0 java
473 27 11036 48228 5880 1 LogonUI
47 6 1196 3360 688 0 LsaIso
2104 193 89624 91476 696 0 lsass
431 30 37172 47308 2544 0 Microsoft.ActiveDirectory.WebServices
1027 297 431220 382664 6892 0 Microsoft.IdentityServer.ServiceHost
235 13 3420 10628 4780 0 msdtc
376 21 6864 27296 1056 0 OpenWith
329 9 2720 6768 1004 0 postgres
393 14 3328 19092 2640 0 postgres
327 9 2676 6740 2868 0 postgres
443 11 6600 16856 4204 0 postgres
329 9 2968 11284 4384 0 postgres
329 9 3288 7628 5084 0 postgres
329 9 3632 8024 5088 0 postgres
328 9 3036 7136 5372 0 postgres
329 9 3080 10708 5480 0 postgres
328 9 2996 9144 5484 0 postgres
0 13 316 14320 92 0 Registry
0 0 168 13316 48 0 Secure System
641 15 6236 14052 668 0 services
53 3 484 1208 340 0 smss
727 71 279952 193952 5160 0 sqlservr
135 10 1644 8100 3304 0 sqlwriter
222 12 1764 7660 8 0 svchost
130 16 3444 7668 812 0 svchost
153 9 1748 6724 824 0 svchost
90 5 928 4000 888 0 svchost
779 16 5776 15412 908 0 svchost
775 19 4204 11164 948 0 svchost
191 11 1864 8348 964 0 svchost
238 10 1732 6940 992 0 svchost
145 7 1324 5920 1028 0 svchost
262 14 3828 9476 1076 0 svchost
222 9 2136 7560 1116 0 svchost
119 8 1328 6132 1136 0 svchost
372 13 10460 14968 1232 0 svchost
412 32 11484 20596 1272 0 svchost
376 19 5232 13500 1352 0 svchost
256 16 3252 13200 1400 0 svchost
240 12 2840 12300 1416 0 svchost
439 9 2804 9060 1428 0 svchost
122 7 1248 5656 1440 0 svchost
179 10 1776 8408 1476 0 svchost
324 10 2552 8644 1532 0 svchost
163 11 1664 8016 1540 0 svchost
367 18 5004 14496 1604 0 svchost
318 13 2108 9140 1636 0 svchost
185 11 1916 8228 1732 0 svchost
148 9 1584 6672 1792 0 svchost
108 7 1136 5220 1804 0 svchost
266 13 3788 11324 1816 0 svchost
221 12 2208 9320 1924 0 svchost
170 9 1932 7168 1960 0 svchost
189 15 6088 10324 2008 0 svchost
233 12 2672 12572 2156 0 svchost
465 17 14960 24300 2220 0 svchost
472 19 3360 12528 2272 0 svchost
243 25 3624 12820 2328 0 svchost
303 20 9284 15728 2340 0 svchost
206 11 2236 8596 2456 0 svchost
316 16 16304 19000 2616 0 svchost
143 9 2980 10640 2700 0 svchost
171 12 3852 11148 2760 0 svchost
165 10 1988 7740 2824 0 svchost
130 7 1288 5888 2928 0 svchost
179 11 2452 13284 2948 0 svchost
423 22 17132 31188 3124 0 svchost
269 13 2488 8076 3204 0 svchost
326 18 5644 22760 3212 0 svchost
139 8 1528 6432 3312 0 svchost
139 9 1588 6728 3340 0 svchost
234 14 4672 12244 3424 0 svchost
296 17 3800 14672 3456 0 svchost
170 10 2144 13168 3532 0 svchost
239 13 2256 8436 3688 0 svchost
409 26 3492 13392 4148 0 svchost
171 9 3044 7844 6968 0 svchost
1962 0 192 152 4 0 System
214 16 2440 10776 4024 0 vds
177 11 3248 12028 3476 0 VGAuthService
151 8 1688 7332 3404 0 vm3dservice
144 10 1784 7772 3924 1 vm3dservice
140 9 1664 7604 6928 1 vm3dservice
178 10 2460 9960 4508 0 vmcompute
629 25 43856 30616 3444 0 vmms
410 23 11412 23712 3416 0 vmtoolsd
403 19 9480 20952 3028 0 vmwp
176 11 1396 6484 532 0 wininit
246 12 2544 18044 628 1 winlogon
395 20 24924 35348 2036 0 WmiPrvSE
324 16 18068 27152 4952 0 WmiPrvSE
286 16 3492 12096 2548 0 wrapper
3114 36 103816 130704 1.78 5276 0 wsmprovhost
certsrv
dns
GoogleCrashHandler
GoogleCrashHandler64
GoogleUpdate
java
OpenWith
postgres
sqlservr
sqlwriter
vmcompute
vmms
vmwp
Services
*evil-winrm* ps c:\Users\matthew\Documents> Bypass-4MSI
info: Patching 4MSI, please be patient...
[+] Success!
*evil-winrm* ps c:\Users\matthew\Documents> services
Path Privileges Service
---- ---------- -------
c:\Windows\ADFS\Microsoft.IdentityServer.ServiceHost.exe False adfssrv
"c:\Program Files (x86)\ManageEngine\ADSelfService Plus\bin\wrapper.exe" -s "C:\Program Files (x86)\ManageEngine\ADSelfService Plus\conf\wrapper.conf" False ADSelfServicePlus
c:\Windows\ADWS\Microsoft.ActiveDirectory.WebServices.exe False ADWS
"c:\Program Files\Google\Chrome\Application\110.0.5481.178\elevation_service.exe" False GoogleChromeElevationService
"c:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /svc False gupdate
"c:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /medsvc False gupdatem
c:\Windows\WID\Binn\sqlservr.exe -SMSWIN8.SQLWID -sMICROSOFT##WID False MSSQL$MICROSOFT##WID
c:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe True NetTcpPortSharing
c:\Windows\SysWow64\perfhost.exe False PerfHost
"c:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe" False Sense
c:\Windows\servicing\TrustedInstaller.exe False TrustedInstaller
"c:\Program Files\VMware\VMware Tools\VMware VGAuth\VGAuthService.exe" False VGAuthService
"c:\Program Files\VMware\VMware Tools\vmtoolsd.exe" False VMTools
"c:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2301.6-0\NisSrv.exe" True WdNisSvc
c:\Windows\WID\Binn\sqlwriter.exe -w False WIDWriter
"c:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2301.6-0\MsMpEng.exe" True WinDefend
"c:\Program Files\Windows Media Player\wmpnetwk.exe" False WMPNetworkSvc
Tasks
*Evil-WinRM* PS C:\Users\matthew\Documents> Get-ScheduledTask | where {$_.TaskPath -notlike "\Microsoft*" } | ft TaskName,TaskPath,State
Cannot connect to CIM server. Access denied
At line:1 char:1
+ Get-ScheduledTask | where {$_.TaskPath -notlike "\Microsoft*" } | ft ...
+ ~~~~~~~~~~~~~~~~~
+ CategoryInfo : ResourceUnavailable: (MSFT_ScheduledTask:String) [Get-ScheduledTask], CimJobException
+ FullyQualifiedErrorId : CimJob_BrokenCimSession,Get-ScheduledTask
*Evil-WinRM* PS C:\Users\matthew\Documents> schtasks /QUERY /FO TABLE | findstr /v /i "\Microsoft" | findstr /v /i "access level" | findstr /v /i "system32"
Program 'schtasks.exe' failed to run: Access is deniedAt line:1 char:1
+ schtasks /QUERY /FO TABLE | findstr /v /i "\Microsoft" | findstr /v / ...
+ ~~~~~~~~~~~~~~~~~~~~~~~~~.
At line:1 char:1
+ schtasks /QUERY /FO TABLE | findstr /v /i "\Microsoft" | findstr /v / ...
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : ResourceUnavailable: (:) [], ApplicationFailedException
+ FullyQualifiedErrorId : NativeCommandFailed
Firewall & AV
*evil-winrm* ps c:\Users\matthew\Documents> netsh firewall show config
domain profile configuration (current):
-------------------------------------------------------------------
Operational mode = Enable
Exception mode = Enable
Multicast/broadcast response mode = Enable
Notification mode = Disable
service configuration for domain profile:
Mode Customized Name
-------------------------------------------------------------------
Enable No File and Printer Sharing
allowed programs configuration for domain profile:
Mode Traffic direction Name / Program
-------------------------------------------------------------------
port configuration for domain profile:
Port Protocol Mode Traffic direction Name
-------------------------------------------------------------------
icmp configuration for domain profile:
Mode Type Description
-------------------------------------------------------------------
Enable 8 Allow inbound echo request
standard profile configuration:
-------------------------------------------------------------------
Operational mode = Enable
Exception mode = Enable
Multicast/broadcast response mode = Enable
Notification mode = Disable
service configuration for standard profile:
Mode Customized Name
-------------------------------------------------------------------
Enable No File and Printer Sharing
Enable Yes Network Discovery
allowed programs configuration for standard profile:
Mode Traffic direction Name / Program
-------------------------------------------------------------------
port configuration for standard profile:
Port Protocol Mode Traffic direction Name
-------------------------------------------------------------------
icmp configuration for standard profile:
Mode Type Description
-------------------------------------------------------------------
Enable 8 Allow inbound echo request
log configuration:
-------------------------------------------------------------------
file location = c:\Windows\system32\LogFiles\Firewall\pfirewall.log
Max file size = 4096 KB
Dropped packets = Disable
Connections = Disable
important: Command executed successfully.
However, "netsh firewall" is deprecated;
use "netsh advfirewall firewall" instead.
For more information on using "netsh advfirewall firewall" commands
instead of "netsh firewall", see KB article 947709
at https://go.microsoft.com/fwlink/?linkid=121488 .
FW is heavily enabled
*evil-winrm* ps c:\Users\matthew\Documents> Get-MpComputerStatus ; Get-MpPreference | Select-Object -Property ExclusionPath
Cannot connect to CIM server. Access denied
at line:1 char:1
+ Get-MpComputerStatus ; Get-MpPreference | Select-Object -Property Exc ...
+ ~~~~~~~~~~~~~~~~~~~~
+ categoryinfo : ResourceUnavailable: (MSFT_MpComputerStatus:String) [Get-MpComputerStatus], CimJobException
+ fullyqualifiederrorid : CimJob_BrokenCimSession,Get-MpComputerStatus
Cannot connect to CIM server. Access denied
at line:1 char:24
+ Get-MpComputerStatus ; Get-MpPreference | Select-Object -Property Exc ...
+ ~~~~~~~~~~~~~~~~
+ categoryinfo : ResourceUnavailable: (MSFT_MpPreference:String) [Get-MpPreference], CimJobException
+ fullyqualifiederrorid : CimJob_BrokenCimSession,Get-MpPreference
Session Architecture
*Evil-WinRM* PS C:\Users\matthew\Documents> [Environment]::Is64BitProcess
True
Installed .NET Frameworks
*evil-winrm* ps c:\Users\matthew\Documents> cmd /c dir /A:D C:\Windows\Microsoft.NET\Framework ; cmd /c reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP" ; cmd /c reg query "HKLM\SOFTWARE\Microsoft\Net Framework Setup\NDP" /s
Volume in drive C has no label.
Volume Serial Number is D9B1-79BF
directory of c:\Windows\Microsoft.NET\Framework
09/14/2018 11:19 PM <DIR> .
09/14/2018 11:19 PM <DIR> ..
09/14/2018 11:19 PM <DIR> v1.0.3705
09/14/2018 11:19 PM <DIR> v1.1.4322
09/14/2018 11:19 PM <DIR> v2.0.50727
01/16/2024 11:10 PM <DIR> v4.0.30319
0 File(s) 0 bytes
6 Dir(s) 6,371,500,032 bytes free
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\CDF
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4.0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\CDF
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\CDF\v4.0
HttpNamespaceReservationInstalled REG_DWORD 0x1
NetTcpPortSharingInstalled REG_DWORD 0x1
NonHttpActivationInstalled REG_DWORD 0x1
smsvchostpath reg_sz c:\Windows\Microsoft.NET\Framework64\v4.0.30319\
WMIInstalled REG_DWORD 0x1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Client
CBS REG_DWORD 0x1
Install REG_DWORD 0x1
installpath reg_sz c:\Windows\Microsoft.NET\Framework64\v4.0.30319\
Release REG_DWORD 0x70bf6
Servicing REG_DWORD 0x0
TargetVersion REG_SZ 4.0.0
Version REG_SZ 4.7.03190
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Client\1033
CBS REG_DWORD 0x1
Install REG_DWORD 0x1
Release REG_DWORD 0x70bf6
Servicing REG_DWORD 0x0
TargetVersion REG_SZ 4.0.0
Version REG_SZ 4.7.03190
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Full
CBS REG_DWORD 0x1
Install REG_DWORD 0x1
installpath reg_sz c:\Windows\Microsoft.NET\Framework64\v4.0.30319\
Release REG_DWORD 0x70bf6
Servicing REG_DWORD 0x0
TargetVersion REG_SZ 4.0.0
Version REG_SZ 4.7.03190
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Full\1033
CBS REG_DWORD 0x1
Install REG_DWORD 0x1
Release REG_DWORD 0x70bf6
Servicing REG_DWORD 0x0
TargetVersion REG_SZ 4.0.0
Version REG_SZ 4.7.03190
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4.0
(Default) REG_SZ deprecated
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4.0\Client
Install REG_DWORD 0x1
Version REG_SZ 4.0.0.0
.NET 4.7.03190