Home Directory
Checking for the home directory of the compromised enox
user after performing a manual enumeration on the dc01.heist.offsec
(192.168.198.165
) host.
*Evil-WinRM* PS C:\Users\enox> tree /F /A
Folder PATH listing
Volume serial number is 5C30-DCD7
C:.
+---Desktop
| | local.txt
| | todo.txt
| |
| \---application
| | app.py
| |
| \---templates
| error.html
| index.html
|
+---Documents
+---Downloads
+---Favorites
+---Links
+---Music
+---Pictures
+---Saved Games
\---Videos
todo.txt
*Evil-WinRM* PS C:\Users\enox> cat Desktop\todo.txt
- Setup Flask Application for Secure Browser [DONE]
- Use group managed service account for apache [DONE]
- Migrate to apache
- Debug Flask Application [DONE]
- Remove Flask Application
- Submit IT Expenses file to admin. [DONE]