5 box enum
PEAS
â•£ Users
Current user: ariah
Current groups: Domain Users, Everyone, Users, Network, Authenticated Users, This Organization, Local account, NTLM Authentication
â•£ Current TCP Listening Ports
Protocol Local Address Local Port Remote Address Remote Port State Process ID Process Name
TCP 127.0.0.1 14147 0.0.0.0 0 Listening 2000 FileZilla Server
â•£ Enumerating Security Packages Credentials
Version: NetNTLMv2
Hash: ariah::NICKEL:1122334455667788:cc82f6ee1002ccca239f42bba5dd5041:01010000000000001a0d24010596d7016b93430d8ef821470000000008003000300000000000000000000000002000008da3dcf95e2925ce59dd648e73bb4a25b17d5c66
1e53aac37bd3fbccc64ab49e0a00100000000000000000000000000000000000090000000000000000000000
â•£ Looking for possible password files in users homes
C:\Users\All Users\Microsoft\UEV\InboxTemplates\RoamingCredentialSettings.xmlPowerUp.ps1
[*] Checking %PATH% for potentially hijackable .dll locations...
HijackablePath : C:\Users\ariah\AppData\Local\Microsoft\WindowsApps\
AbuseFunction : Write-HijackDll -OutputFile 'C:\Users\ariah\AppData\Local\Microsoft\WindowsApps\\wlbsctrl.dll' -Command '...'Seatbelt.exe
Last updated