Home Directory


Checking for the home directory of the compromised enox user after performing a manual enumeration on the dc01.heist.offsec(192.168.198.165) host.

*Evil-WinRM* PS C:\Users\enox> tree /F /A
Folder PATH listing
Volume serial number is 5C30-DCD7
C:.
+---Desktop
|   |   local.txt
|   |   todo.txt
|   |
|   \---application
|       |   app.py
|       |
|       \---templates
|               error.html
|               index.html
|
+---Documents
+---Downloads
+---Favorites
+---Links
+---Music
+---Pictures
+---Saved Games
\---Videos

todo.txt


*Evil-WinRM* PS C:\Users\enox> cat Desktop\todo.txt
- Setup Flask Application for Secure Browser [DONE]
- Use group managed service account for apache [DONE]
- Migrate to apache
- Debug Flask Application [DONE]
- Remove Flask Application
- Submit IT Expenses file to admin. [DONE]