Windows

NOTE:

  • Username and hostname

  • Group memberships of the current user

  • Existing users and groups

  • Operating system, version and architecture

  • Network information

  • Installed applications

  • Running processes

Interesting Directory

Interesting Files

Command Prompt

Powershell

User Permissions

User Information

NOTE: The above command consists of the following

Page links to different permission attacks (?)

User Enumeration

Get all user in the current machine

Get information on a particular user

Get groups on domain

Get users in a particular group

Get information on a particular group in the domain

Get local administrators

Get SMB shares

Get password requirements

System Enumeration

Get important information

Get port information

Get network information

Get current console

Installed programs

Web Root Directory

NOTE: Indication of Web Director:

  • .htaccess

  • public.html

  • www

  • htdocs

  • httpdcos

Get History

PowerView

NOTE: Remember to run the following

Enumerate Users in the Domain

To get filtered result

EXAMPLE:

Get-NetUser | select samaccountname, cn, pwdlastset, lastlogon

To get specific information of a particular user

Enumerate Groups in the Domain

To get filtered result

EXAMPLE:

Get-NetGroup | select cn

To get specific information of a particular group

Enumerate Computers in the Domain

To get filtered result

EXAMPLE:

Get-NetComputer | select operatingsystem, dnshostname

To get specific information of a particular computer

To look for administrative rights on other computer for the current user

To look for logged on users on target machine

NOTE: If something is not right check for permission.

Permissions for NetSessionEnum are defined in SrvsvcSessionInfo registry key (HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\DefaultSecurity)

Alternatives

NOTE: Remote machine must have Remote Registry service enabled

To check for permission

EXAMPLE:

Get-Acl -Path HKLM:SYSTEM\CurrentControlSet\Services\LanmanServer\DefaultSecurity\ | fl

To enumerate Service Principal Name

To enumerate ACEs

NOTE: Look out for ActiveDirectoryRights and SecurityIdentifier

To enumerate interesting ACL

To enumerate all user that has ActiveDirectoryRights = GenericAll under a group

To enumerate all ActiveDirectoryRights = GenericWrite under a group

To convert SID to Name in bulk

To convert SID to Name individually

Add user into group in domain

To enumerate all shares on Domain

To enumerate shares available to current user

To enumerate Group Policy

EXAMPLE:

Get-GPO -Name "Default Domain Policy"

To enumerate permission on the group policy

NOTE: Only if the permission either contains "ModifySecurity" or "FullControl"

BloodHound

To import BloodHound

To begin enumerationg on BloodHound

On kali:

NOTE: Head over to http://localhost:7474

Username: neo4j

Password: arctic-iris-zipper-prism-courage-7161

Last updated