PEAS


Conducting an automated enumeration after performing a manual enumeration

*Evil-WinRM* PS C:\Users\anirudh\Documents> upload winPEASany.exe
 
Info: Uploading /home/kali/PEN-200/PG_PRACTICE/vault/winPEASany.exe to C:\Users\anirudh\Documents\winPEASany.exe
Data: 13526356 bytes of 13526356 bytes copied
Info: Upload successful!

Delivery complete

Executing PEAS

ENV


ÉÍÍÍÍÍÍÍÍÍ͹ User Environment Variables
È Check for some passwords or keys in the env variables 
    COMPUTERNAME: DC
    USERPROFILE: C:\Users\anirudh
    HOMEPATH: \Users\anirudh
    LOCALAPPDATA: C:\Users\anirudh\AppData\Local
    PSModulePath: C:\Users\anirudh\Documents\WindowsPowerShell\Modules;C:\Program Files\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules
    PROCESSOR_ARCHITECTURE: AMD64
    Path: C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\anirudh\AppData\Local\Microsoft\WindowsApps
    CommonProgramFiles(x86): C:\Program Files (x86)\Common Files
    ProgramFiles(x86): C:\Program Files (x86)
    PROCESSOR_LEVEL: 25
    LOGONSERVER: \\DC
    PATHEXT: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC;.CPL
    HOMEDRIVE: C:
    SystemRoot: C:\Windows
    ALLUSERSPROFILE: C:\ProgramData
    DriverData: C:\Windows\System32\Drivers\DriverData
    APPDATA: C:\Users\anirudh\AppData\Roaming
    PROCESSOR_REVISION: 0101
    USERNAME: anirudh
    CommonProgramW6432: C:\Program Files\Common Files
    CommonProgramFiles: C:\Program Files\Common Files
    OS: Windows_NT
    USERDOMAIN_ROAMINGPROFILE: VAULT
    PROCESSOR_IDENTIFIER: AMD64 Family 25 Model 1 Stepping 1, AuthenticAMD
    ComSpec: C:\Windows\system32\cmd.exe
    SystemDrive: C:
    TEMP: C:\Users\anirudh\AppData\Local\Temp
    ProgramFiles: C:\Program Files
    NUMBER_OF_PROCESSORS: 2
    TMP: C:\Users\anirudh\AppData\Local\Temp
    ProgramData: C:\ProgramData
    ProgramW6432: C:\Program Files
    windir: C:\Windows
    USERDOMAIN: VAULT
    PUBLIC: C:\Users\Public
    USERDNSDOMAIN: VAULT.OFFSEC
 
ÉÍÍÍÍÍÍÍÍÍ͹ System Environment Variables
È Check for some passwords or keys in the env variables 
    ComSpec: C:\Windows\system32\cmd.exe
    DriverData: C:\Windows\System32\Drivers\DriverData
    OS: Windows_NT
    Path: C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\
    PATHEXT: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
    PROCESSOR_ARCHITECTURE: AMD64
    PSModulePath: C:\Program Files\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules
    TEMP: C:\Windows\TEMP
    TMP: C:\Windows\TEMP
    USERNAME: SYSTEM
    windir: C:\Windows
    NUMBER_OF_PROCESSORS: 2
    PROCESSOR_LEVEL: 25
    PROCESSOR_IDENTIFIER: AMD64 Family 25 Model 1 Stepping 1, AuthenticAMD
    PROCESSOR_REVISION: 0101

N/A


UAC


PowerShell


KrbRelayUp


KrbRelayUp

NTLM


Token Privileges (anirudh)


Enumerated

RDP Session


AutoLogon


*Evil-WinRM* PS C:\Users\anirudh\Documents> reg query "HKLM\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon"
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon
    AutoRestartShell    REG_DWORD    0x1
    Background    REG_SZ    0 0 0
    CachedLogonsCount    REG_SZ    10
    DebugServerCommand    REG_SZ    no
    DefaultDomainName    REG_SZ    VAULT
    DefaultUserName    REG_SZ    anirudh
    DisableBackButton    REG_DWORD    0x1
    EnableSIHostIntegration    REG_DWORD    0x1
    ForceUnlockLogon    REG_DWORD    0x0
    LegalNoticeCaption    REG_SZ
    LegalNoticeText    REG_SZ
    PasswordExpiryWarning    REG_DWORD    0x5
    PowerdownAfterShutdown    REG_SZ    0
    PreCreateKnownFolders    REG_SZ    {A520A1A4-1780-4FF6-BD18-167343C5AF16}
    ReportBootOk    REG_SZ    1
    Shell    REG_SZ    explorer.exe
    ShellCritical    REG_DWORD    0x0
    ShellInfrastructure    REG_SZ    sihost.exe
    SiHostCritical    REG_DWORD    0x0
    SiHostReadyTimeOut    REG_DWORD    0x0
    SiHostRestartCountLimit    REG_DWORD    0x0
    SiHostRestartTimeGap    REG_DWORD    0x0
    Userinit    REG_SZ    C:\Windows\system32\userinit.exe,
    VMApplet    REG_SZ    SystemPropertiesPerformance.exe /pagefile
    WinStationsDisabled    REG_SZ    0
    scremoveoption    REG_SZ    0
    DisableCAD    REG_DWORD    0x1
    LastLogOffEndTimePerfCounter    REG_QWORD    0x7c3e010d
    ShutdownFlags    REG_DWORD    0x20a
    DisableLockWorkstation    REG_DWORD    0x0
    DefaultPassword    REG_SZ    SecureHM
    AutoAdminLogon    REG_SZ    1
    AutoLogonSID    REG_SZ    S-1-5-21-537427935-490066102-1511301751-1103
    LastUsedUsername    REG_SZ    anirudh
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon\AlternateShells
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon\GPExtensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon\UserDefaults
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon\AutoLogonChecked
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon\VolatileUserMgrKey

Scheduled Tasks


powershell.exe C:\Users\anirudh\KillExplorer.ps1

explorer.exe "C:\DocumentsShare"

Windows Vault


adPEAS


*Evil-WinRM* PS C:\Users\anirudh\Documents> upload adPEAS.ps1
 
Info: Uploading /home/kali/PEN-200/PG_PRACTICE/vault/adPEAS.ps1 to C:\Users\anirudh\Documents\adPEAS.ps1
Data: 4159704 bytes of 4159704 bytes copied
Info: Upload successful!

Delivery complete

Executing adPEAS

Domain


Add-Computer


PowerUp


*Evil-WinRM* PS C:\Users\anirudh\Documents> upload PowerUp.ps1
 
Info: Uploading /home/kali/PEN-200/PG_PRACTICE/vault/PowerUp.ps1 to C:\Users\anirudh\Documents\PowerUp.ps1
Data: 800772 bytes of 800772 bytes copied
Info: Upload successful!

Delivery complete

*Evil-WinRM* PS C:\Users\anirudh\Documents> . .\PowerUp.ps1
*Evil-WinRM* PS C:\Users\anirudh\Documents> Invoke-AllChecks
 
 
Privilege   : SeBackupPrivilege
Attributes  : SE_PRIVILEGE_ENABLED_BY_DEFAULT, SE_PRIVILEGE_ENABLED
TokenHandle : 22880
ProcessId   : 2012
Name        : 2012
Check       : Process Token Privileges
 
Privilege   : SeRestorePrivilege
Attributes  : SE_PRIVILEGE_ENABLED_BY_DEFAULT, SE_PRIVILEGE_ENABLED
TokenHandle : 22880
ProcessId   : 2012
Name        : 2012
Check       : Process Token Privileges
 
Access denied 
At C:\Users\anirudh\Documents\PowerUp.ps1:2066 char:21
+     $VulnServices = Get-WmiObject -Class win32_service | Where-Object ...
+                     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    + CategoryInfo          : InvalidOperation: (:) [Get-WmiObject], ManagementException
    + FullyQualifiedErrorId : GetWMIManagementException,Microsoft.PowerShell.Commands.GetWmiObjectCommand
Access denied 
At C:\Users\anirudh\Documents\PowerUp.ps1:2133 char:5
+     Get-WMIObject -Class win32_service | Where-Object {$_ -and $_.pat ...
+     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    + CategoryInfo          : InvalidOperation: (:) [Get-WmiObject], ManagementException
    + FullyQualifiedErrorId : GetWMIManagementException,Microsoft.PowerShell.Commands.GetWmiObjectCommand
Cannot open Service Control Manager on computer '.'. This operation might require other privileges.
At C:\Users\anirudh\Documents\PowerUp.ps1:2189 char:5
+     Get-Service | Test-ServiceDaclPermission -PermissionSet 'ChangeCo ...
+     ~~~~~~~~~~~
    + CategoryInfo          : NotSpecified: (:) [Get-Service], InvalidOperationException
    + FullyQualifiedErrorId : System.InvalidOperationException,Microsoft.PowerShell.Commands.GetServiceCommand
ModifiablePath    : C:\Users\anirudh\AppData\Local\Microsoft\WindowsApps
IdentityReference : VAULT\anirudh
Permissions       : {WriteOwner, Delete, WriteAttributes, Synchronize...}
%PATH%            : C:\Users\anirudh\AppData\Local\Microsoft\WindowsApps
Name              : C:\Users\anirudh\AppData\Local\Microsoft\WindowsApps
Check             : %PATH% .dll Hijacks
AbuseFunction     : Write-HijackDll -DllPath 'C:\Users\anirudh\AppData\Local\Microsoft\WindowsApps\wlbsctrl.dll'
 
DefaultDomainName    : VAULT
DefaultUserName      : anirudh
DefaultPassword      : SecureHM
AltDefaultDomainName :
AltDefaultUserName   :
AltDefaultPassword   :
Check                : Registry Autologons
 
TaskName     : Killexplorer
TaskFilePath : @{ModifiablePath=C:\Users\anirudh\KillExplorer.ps1; IdentityReference=VAULT\anirudh; Permissions=System.Object[]}
TaskTrigger  : <Triggers xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"><TimeTrigger><Repetition><Interval>PT5M</Interval><StopAtDurationEnd>false</StopAtDurationEnd></Repetition><StartBoundary>2021-11-19T01:05:00</StartBoundary><Enab
               led>true</Enabled></TimeTrigger></Triggers>
Name         : Killexplorer
Check        : Modifiable Scheduled Task Files
 
TaskName     : ShareCheck
TaskFilePath : @{ModifiablePath=C:\DocumentsShare; IdentityReference=BUILTIN\Users; Permissions=AppendData/AddSubdirectory}
TaskTrigger  : <Triggers xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"><TimeTrigger><Repetition><Interval>PT1M</Interval><StopAtDurationEnd>false</StopAtDurationEnd></Repetition><StartBoundary>2021-11-19T01:05:00</StartBoundary><Enab
               led>true</Enabled></TimeTrigger></Triggers>
Name         : ShareCheck
Check        : Modifiable Scheduled Task Files
 
TaskName     : ShareCheck
TaskFilePath : @{ModifiablePath=C:\DocumentsShare; IdentityReference=BUILTIN\Users; Permissions=WriteData/AddFile}
TaskTrigger  : <Triggers xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"><TimeTrigger><Repetition><Interval>PT1M</Interval><StopAtDurationEnd>false</StopAtDurationEnd></Repetition><StartBoundary>2021-11-19T01:05:00</StartBoundary><Enab
               led>true</Enabled></TimeTrigger></Triggers>
Name         : ShareCheck
Check        : Modifiable Scheduled Task Files
 
TaskName     : Server Initial Configuration Task
TaskFilePath : @{ModifiablePath=C:\; IdentityReference=BUILTIN\Users; Permissions=AppendData/AddSubdirectory}
TaskTrigger  : <Triggers xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"><BootTrigger /></Triggers>
Name         : Server Initial Configuration Task
Check        : Modifiable Scheduled Task Files
 
TaskName     : Server Initial Configuration Task
TaskFilePath : @{ModifiablePath=C:\; IdentityReference=BUILTIN\Users; Permissions=WriteData/AddFile}
TaskTrigger  : <Triggers xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"><BootTrigger /></Triggers>
Name         : Server Initial Configuration Task
Check        : Modifiable Scheduled Task Files
 
TaskName     : Proxy
TaskFilePath : @{ModifiablePath=C:\; IdentityReference=BUILTIN\Users; Permissions=AppendData/AddSubdirectory}
TaskTrigger  : <Triggers xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"><BootTrigger id="AutochkProxy"><Delay>PT30M</Delay></BootTrigger></Triggers>
Name         : Proxy
Check        : Modifiable Scheduled Task Files
 
TaskName     : Proxy
TaskFilePath : @{ModifiablePath=C:\; IdentityReference=BUILTIN\Users; Permissions=WriteData/AddFile}
TaskTrigger  : <Triggers xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"><BootTrigger id="AutochkProxy"><Delay>PT30M</Delay></BootTrigger></Triggers>
Name         : Proxy
Check        : Modifiable Scheduled Task Files
 
TaskName     : SpaceManagerTask
TaskFilePath : @{ModifiablePath=C:\; IdentityReference=BUILTIN\Users; Permissions=AppendData/AddSubdirectory}
TaskTrigger  : <Triggers
               xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"><BootTrigger><Enabled>false</Enabled><Delay>PT2M</Delay></BootTrigger><WnfStateChangeTrigger><StateName>7510BCA33E1E8702</StateName></WnfStateChangeTrigger></Triggers>
Name         : SpaceManagerTask
Check        : Modifiable Scheduled Task Files
 
TaskName     : SpaceManagerTask
TaskFilePath : @{ModifiablePath=C:\; IdentityReference=BUILTIN\Users; Permissions=WriteData/AddFile}
TaskTrigger  : <Triggers
               xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"><BootTrigger><Enabled>false</Enabled><Delay>PT2M</Delay></BootTrigger><WnfStateChangeTrigger><StateName>7510BCA33E1E8702</StateName></WnfStateChangeTrigger></Triggers>
Name         : SpaceManagerTask
Check        : Modifiable Scheduled Task Files
 
TaskName     : Recovery-Check
TaskFilePath : @{ModifiablePath=C:\; IdentityReference=BUILTIN\Users; Permissions=AppendData/AddSubdirectory}
TaskTrigger  : <Triggers xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"><LogonTrigger /></Triggers>
Name         : Recovery-Check
Check        : Modifiable Scheduled Task Files
 
TaskName     : Recovery-Check
TaskFilePath : @{ModifiablePath=C:\; IdentityReference=BUILTIN\Users; Permissions=WriteData/AddFile}
TaskTrigger  : <Triggers xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"><LogonTrigger /></Triggers>
Name         : Recovery-Check
Check        : Modifiable Scheduled Task Files