adPEAS


*evil-winrm* ps c:\Users\winrm_svc\Documents> upload ./adPEAS/adPEAS.ps1 C:\Users\winrm_svc\Documents
info: Uploading /home/kali/archive/htb/labs/rebound/adPEAS/adPEAS.ps1 to C:\Users\winrm_svc\Documents
data: 4159704 bytes of 4159704 bytes copied
info: Upload successful!
 
*evil-winrm* ps c:\Users\winrm_svc\Documents> . .\adPEAS.ps1

Delivery complete

*evil-winrm* ps c:\Users\winrm_svc\Documents> $SecPassword = ConvertTo-SecureString 'Qwer1234' -AsPlainText -Force ; $Cred = New-Object System.Management.Automation.PSCredential('REBOUND\winrm_svc', $SecPassword)

Creating a PSCredential object of the winrm_svc user for adPEAS

Executing adPEAS

General


Policies


Add-Computer


SeMachineAccountPrivilege This has already been confirmed

ADCS


Presence of ADCS was suspected from the earlier process enumeration The CA is rebound-DC01-CA, and several templates are avilable

EFS


WebServer


Machine


User


SubCA


ASREPRoasting


gMSA


Constrained Delegation


winrm_svc


The current user apparently is part of the BUILTIN\Access Control Assistance Operators group