Beyond


This is the beyond page that an additional post enumeration and assessment are conducted as SYSTEM after compromising the target system.

GPO


Default Domain Policy: Delegation is set to the anirudh user

The task created by thepyGPOAbuse can be seen Literally ANYTHING can be done through GPO as it affects the entire domain Any form of Write access to Default Domain Policy basically means a complete domain compromise

Scheduled Tasks


  • Killexplorer
  • ShareCheck

Killexplorer Task


Every 5 minutes, executing powershell.exe C:\Users\anirudh\KillExplorer.ps1

C:\Users\anirudh\KillExplorer.ps1


PS C:\Windows\system32> cat C:\Users\anirudh\KillExplorer.ps1
$shell=New-Object -ComObject Shell.Application
$window = $shell.Windows() | Where-Object { $_.LocationURL -like "$(([uri]"C:\DocumentsShare").AbsoluteUri)*" }
$window | ForEach-Object { $_.Quit() }

This just kills the explorer process created by the ShareCheck task below

ShareCheck Task


Every minute, executing explorer.exe "C:\DocumentsShare"