-
Run Auto scripts
- Start with PowerUP/SharpUP
- winpeas.exe cmd wait
- seatbelt.exe
- run jaws
-
System Infomation
Figure Out unsername, groups, OS, & Kernel Versions
- whoami /priv
&
net user <username> #to get user and group info
- OS INFO
systeminfo | findstr /B /C:"OS Name" /C:"OS Version" /C:"System Type"
-
Scheduled task
- schtasks /query /fo LIST /v
-
running services
- net start
-
stored
credentials
-
Password
Mining
- #find the string 'password' in all files of certain file type
- findstr /si password *.txt
- findstr /si password *.xml
- findstr /si password *.ini
- #Find all these strings in config files.
- dir /s *pass* == *cred* == *vnc* == *.config*
- # Find all passwords in all files.
- findstr /spin "password" *.*
- findstr /spin "password" *.*
- findstr /si password *.txt
- dir /s *password*
-
Try Quick
Wins First
-
Service exploits
- Unquoted Service Path
- Mod binary Service Path
- named pipes
- DLL Hijacking
-
Registry exploits
- Alway Ekevvated
- password can be found here to
- GUI
&
startup apps
- Sceudled tasks
-
Installed apps
- Unattended Installs
-
Admin Processes
- find version and seach for exploit
-
Find a writable folder
- # Default writable folders
C:\Windows\System32\Microsoft\Crypto\RSA\MachineKeys
C:\Windows\System32\spool\drivers\color
C:\Windows\Tasks
C:\windows\tracing1
- READ ALL THE ENUMERATION and add investigation points based on the findings.
-
Look for installed
programs in C:\
&
Program Files
- c:\
- C:\users\public
-
Non standard
windows services
- service binary permissions
- service config permissions
- Install the service in local VM if possible
-
Procmon.exe
-
.dll loads from insecure directories
- .exe loads from insecure directory
- Interesting files
available to user
- Review Scan
data if you can't find
anything again