GnuPG
The presence of GPG(GnuPG) was initially discovered through PEAS as the current user, wao
, has AllAccess to the installation directory; C:\Program Files (x86)\gnupg\bin
*Evil-WinRM* PS C:\Users\WAO\AppData\Roaming> ls
Directory: C:\Users\WAO\AppData\Roaming
Mode LastWriteTime Length Name
---- ------------- ------ ----
d----- 2/17/2024 1:55 AM gnupg
d---s- 2/23/2024 11:04 AM Microsoft
There is the gnupg
directory in the Appdata\Roaming
*Evil-WinRM* PS C:\Users\WAO\AppData\Roaming> cd gnupg ; ls
Directory: C:\Users\WAO\AppData\Roaming\gnupg
Mode LastWriteTime Length Name
---- ------------- ------ ----
d----- 2/17/2024 1:55 AM private-keys-v1.d
d----- 9/16/2024 6:14 AM public-keys.d
-a---- 2/16/2024 11:42 PM 13 common.conf
-a---- 2/17/2024 1:55 AM 0 gnupg_spawn_agent_sentinel.lock
-a---- 2/17/2024 1:55 AM 0 gnupg_spawn_keyboxd_sentinel.lock
-a---- 2/17/2024 1:55 AM 1200 trustdb.gpg
-a---- 2/17/2024 1:55 AM 0 trustdb.gpg.lock
The directory is populated
*Evil-WinRM* PS C:\Users\WAO\AppData\Roaming\gnupg\private-keys-v1.d> ls -Hidden
*Evil-WinRM* PS C:\Users\WAO\AppData\Roaming\gnupg\public-keys.d> ls
Directory: C:\Users\WAO\AppData\Roaming\gnupg\public-keys.d
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 9/16/2024 6:14 AM 77824 pubring.db
-a---- 2/17/2024 1:55 AM 0 pubring.db.lock
There are some public keys available
*Evil-WinRM* PS C:\Users\WAO\AppData\Roaming\gnupg> gpg -k
[keyboxd]
---------
pub rsa3072 2023-12-19 [SC] [expires: 2025-12-18]
5017E93C3BDA7742BF5AFCD5EBB04FD7AC888F55
uid [ unknown] mohammed1997 <aitac2hi.uchiha@gmail.com>
sub rsa3072 2023-12-19 [E] [expires: 2025-12-18]
pub rsa3072 2024-09-15 [SC] [expires: 2026-09-15]
77FCCD026B7489A048865DB5AFA92D3CACA6DE47
uid [ unknown] spectra <spectra@test.htb>
sub rsa3072 2024-09-15 [E] [expires: 2026-09-15]
pub rsa3072 2024-01-02 [SC] [expires: 2026-01-01]
81FE9F82EFFFDB31CD117FD17F4594ABE30D2838
uid [ unknown] mhd1234 <mhd1234@gmail.com>
sub rsa3072 2024-01-02 [E] [expires: 2026-01-01]
pub rsa3072 2023-12-19 [SC] [expires: 2025-12-18]
A3CB1D369B9B6B790ED12858B30BCDF16D498449
uid [ unknown] mohammed1997 <aitac2hi.uchiha@gmail.com>
sub rsa3072 2023-12-19 [E] [expires: 2025-12-18]
pub rsa3072 2023-12-21 [SC] [expires: 2025-12-20]
D082233EA23A218B9A24D2FEF8730854E83C8A3D
uid [ unknown] mohammed1 <Camellia@athento.com>
sub rsa3072 2023-12-21 [E] [expires: 2025-12-20]
All the listed keys include both primary keys ([SC]
, for signing and certification) and subkeys ([E]
, for encryption). This might come in handy as I would be able to perform forgery or impersonation