githubEdit

Initial Enumeration

Initial Enumeration

Type of Windows privilege

NT AUTHORITY\SYSTEM : is a highly privileged account with more privileges than a local administrator account and is used to run most Windows services.

**local administrator** : Some organizations disable this account, but many do not. It is not uncommon to see this account reused across multiple systems in a client environment.

**local Administrators group** : Any account in this group will have the same privileges as the built-in administrator account.

Standard (non-privileged) domain user in Administrators group Domain admin in Administrators group


System Information

Tasklist

give idea about application running on the system

Windows APP

smss.exe, csrss.exe, winlogon.exe, lsass.exe, svchost.exe

C:\irix> tasklist /svc

Image Name                     PID Services
========================= ======== ============================================
System Idle Process              0 N/A
System                           4 N/A
smss.exe                       316 N/A
csrss.exe                      424 N/A
wininit.exe                    528 N/A
csrss.exe                      540 N/A
winlogon.exe                   612 N/A
services.exe                   664 N/A
lsass.exe                      672 KeyIso, SamSs, VaultSvc
svchost.exe                    776 BrokerInfrastructure, DcomLaunch, LSM,
                                   PlugPlay, Power, SystemEventsBroker
svchost.exe                    836 RpcEptMapper, RpcSs
LogonUI.exe                    952 N/A
dwm.exe                        964 N/A
svchost.exe                    972 TermService
svchost.exe                   1008 Dhcp, EventLog, lmhosts, TimeBrokerSvc
svchost.exe                    364 NcbService, PcaSvc, ScDeviceEnum, TrkWks,
                                   UALSVC, UmRdpService
<...SNIP...>

svchost.exe                   1468 Wcmsvc
svchost.exe                   1804 PolicyAgent
spoolsv.exe                   1884 Spooler
svchost.exe                   1988 W3SVC, WAS
svchost.exe                   1996 ftpsvc
svchost.exe                   2004 AppHostSvc
FileZilla Server.exe          1140 FileZilla Server
inetinfo.exe                  1164 IISADMIN
svchost.exe                   1736 DiagTrack
svchost.exe                   2084 StateRepository, tiledatamodelsvc
VGAuthService.exe             2100 VGAuthService
vmtoolsd.exe                  2112 VMTools
MsMpEng.exe                   2136 WinDefend

<...SNIP...>

FileZilla Server Interfac     5628 N/A
jusched.exe                   5796 N/A
cmd.exe                       4132 N/A
conhost.exe                   4136 N/A
TrustedInstaller.exe          1120 TrustedInstaller
TiWorker.exe                  1816 N/A
WmiApSrv.exe                  2428 wmiApSrv
tasklist.exe                  3596 N/A

Display All Environment Variables

View Detailed Configuration Information

systeminfo

display information about system like OS Name , OS Version, System Boot Time

Patches and Updates

show Hotfixes or KBs (history of installed and who installed it and more info than systeminfo)

we use this info to search in Mitre CVE about any KBs CVE

We can do this with PowerShell as well using the Get-Hotfix cmdlet.

Installed Programs

used to display installed software, this information use to guide us to find exploits for services installed like FileZilla/Putty/etc installed

Use Powershell

Display Running Processes

will display active TCP and UDP connections , We may find a vulnerable service only accessible to the local host (when logged on to the host) that we can exploit to escalate privileges.


User & Group Information

Logged-In Users

Display users are logged into a system and Are they idle or active?

Current User Privileges

Current User Group Information

user inherited any rights through their group membership? Are they privileged in the Active Directory domain environment, which could be leveraged to gain access to more systems?

Get All Users

Get All Groups

Details About a Group

display users of group

Get Password Policy & Other Account Information