diff --git a/winPEAS/winPEASbat/winPEAS.bat b/winPEAS/winPEASbat/winPEAS.bat deleted file mode 100755 index 5478eea..0000000 --- a/winPEAS/winPEASbat/winPEAS.bat +++ /dev/null @@ -1,662 +0,0 @@ -@ECHO OFF & SETLOCAL EnableDelayedExpansion -TITLE WinPEAS - Windows local Privilege Escalation Awesome Script -COLOR 0F -CALL :SetOnce - -REM :: WinPEAS - Windows local Privilege Escalation Awesome Script -REM :: Code by carlospolop; Re-Write by ThisLimn0 - -REM Registry scan of other drives besides -REM /////true or false -SET long=false - -REM Check if the current path contains spaces -SET "CurrentFolder=%~dp0" -IF "!CurrentFolder!" NEQ "!CurrentFolder: =!" ( - ECHO winPEAS.bat cannot run if the current path contains spaces. - ECHO Exiting. - EXIT /B 1 -) - -:Splash -ECHO. -CALL :ColorLine " %E%32m((,.,/((((((((((((((((((((/, */%E%97m" -CALL :ColorLine " %E%32m,/*,..*(((((((((((((((((((((((((((((((((,%E%97m" -CALL :ColorLine " %E%32m,*/((((((((((((((((((/, %E%92m.*//((//**,%E%32m .*((((((*%E%97m" -CALL :ColorLine " %E%32m((((((((((((((((* %E%94m*****%E%32m,,,/########## %E%32m.(* ,((((((%E%97m" -CALL :ColorLine " %E%32m(((((((((((/* %E%94m******************%E%32m/####### %E%32m.(. ((((((%E%97m" -CALL :ColorLine " %E%32m((((((.%E%92m.%E%94m******************%E%97m/@@@@@/%E%94m***%E%92m/######%E%32m /((((((%E%97m" -CALL :ColorLine " %E%32m,,.%E%92m.%E%94m**********************%E%97m@@@@@@@@@@(%E%94m***%E%92m,####%E%32m ../(((((%E%97m" -CALL :ColorLine " %E%32m, ,%E%92m%E%94m**********************%E%97m#@@@@@#@@@@%E%94m*********%E%92m##%E%32m((/ /((((%E%97m" -CALL :ColorLine " %E%32m..((%E%92m(##########%E%94m*********%E%97m/#@@@@@@@@@/%E%94m*************%E%32m,,..((((%E%97m" -CALL :ColorLine " %E%32m.((%E%92m(################(/%E%94m******%E%97m/@@@@@#%E%94m****************%E%32m.. /((%E%97m" -CALL :ColorLine " %E%32m.(%E%92m(########################(/%E%94m************************%E%32m..*(%E%97m" -CALL :ColorLine " %E%32m.(%E%92m(#############################(/%E%94m********************%E%32m.,(%E%97m" -CALL :ColorLine " %E%32m.(%E%92m(##################################(/%E%94m***************%E%32m..(%E%97m" -CALL :ColorLine " %E%32m.(%E%92m(######################################(%E%94m************%E%32m..(%E%97m" -CALL :ColorLine " %E%32m.(%E%92m(######(,.***.,(###################(..***(/%E%94m*********%E%32m..(%E%97m" -CALL :ColorLine " %E%32m.(%E%92m(######*(#####((##################((######/(%E%94m********%E%32m..(%E%97m" -CALL :ColorLine " %E%32m.(%E%92m(##################(/**********(################(%E%94m**%E%32m...(%E%97m" -CALL :ColorLine " %E%32m.((%E%92m(####################/*******(###################%E%32m.((((%E%97m" -CALL :ColorLine " %E%32m.((((%E%92m(############################################/%E%32m /((%E%97m" -CALL :ColorLine " %E%32m..((((%E%92m(#########################################(%E%32m..(((((.%E%97m" -CALL :ColorLine " %E%32m....((((%E%92m(#####################################(%E%32m .((((((.%E%97m" -CALL :ColorLine " %E%32m......((((%E%92m(#################################(%E%32m .(((((((.%E%97m" -CALL :ColorLine " %E%32m(((((((((. ,%E%92m(############################(%E%32m../(((((((((.%E%97m" -CALL :ColorLine " %E%32m(((((((((/, %E%92m,####################(%E%32m/..((((((((((.%E%97m" -CALL :ColorLine " %E%32m(((((((((/,. %E%92m,*//////*,.%E%32m ./(((((((((((.%E%97m" -CALL :ColorLine " %E%32m(((((((((((((((((((((((((((/%E%97m" -ECHO. by carlospolop -ECHO. -ECHO. - -:Advisory -REM // Increase progress in title by n percent -CALL :T_Progress 0 -ECHO./^^!\ Advisory: WinPEAS - Windows local Privilege Escalation Awesome Script -CALL :ColorLine " %E%41mWinPEAS should be used for authorized penetration testing and/or educational purposes only.%E%40;97m" -CALL :ColorLine " %E%41mAny misuse of this software will not be the responsibility of the author or of any other collaborator.%E%40;97m" -CALL :ColorLine " %E%41mUse it at your own networks and/or with the network owner's permission.%E%40;97m" -ECHO. - -:SystemInfo -CALL :ColorLine "%E%32m[*]%E%97m BASIC SYSTEM INFO" -CALL :ColorLine " %E%33m[+]%E%97m WINDOWS OS" -ECHO. [i] Check for vulnerabilities for the OS version with the applied patches -ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#kernel-exploits -systeminfo -ECHO. -CALL :T_Progress 2 - -:ListHotFixes -wmic qfe get Caption,Description,HotFixID,InstalledOn | more -set expl=no -for /f "tokens=3-9" %%a in ('systeminfo') do (ECHO."%%a %%b %%c %%d %%e %%f %%g" | findstr /i "2000 XP 2003 2008 vista" && set expl=yes) & (ECHO."%%a %%b %%c %%d %%e %%f %%g" | findstr /i /C:"windows 7" && set expl=yes) -IF "%expl%" == "yes" ECHO. [i] Possible exploits (https://github.com/codingo/OSCP-2/blob/master/Windows/WinPrivCheck.bat) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB2592799" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS11-080 patch is NOT installed! (Vulns: XP/SP3,2K3/SP3-afd.sys) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB3143141" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS16-032 patch is NOT installed! (Vulns: 2K8/SP1/2,Vista/SP2,7/SP1-secondary logon) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB2393802" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS11-011 patch is NOT installed! (Vulns: XP/SP2/3,2K3/SP2,2K8/SP2,Vista/SP1/2,7/SP0-WmiTraceMessageVa) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB982799" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS10-59 patch is NOT installed! (Vulns: 2K8,Vista,7/SP0-Chimichurri) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB979683" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS10-21 patch is NOT installed! (Vulns: 2K/SP4,XP/SP2/3,2K3/SP2,2K8/SP2,Vista/SP0/1/2,7/SP0-Win Kernel) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB2305420" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS10-092 patch is NOT installed! (Vulns: 2K8/SP0/1/2,Vista/SP1/2,7/SP0-Task Sched) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB981957" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS10-073 patch is NOT installed! (Vulns: XP/SP2/3,2K3/SP2/2K8/SP2,Vista/SP1/2,7/SP0-Keyboard Layout) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB4013081" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS17-017 patch is NOT installed! (Vulns: 2K8/SP2,Vista/SP2,7/SP1-Registry Hive Loading) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB977165" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS10-015 patch is NOT installed! (Vulns: 2K,XP,2K3,2K8,Vista,7-User Mode to Ring) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB941693" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS08-025 patch is NOT installed! (Vulns: 2K/SP4,XP/SP2,2K3/SP1/2,2K8/SP0,Vista/SP0/1-win32k.sys) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB920958" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS06-049 patch is NOT installed! (Vulns: 2K/SP4-ZwQuerySysInfo) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB914389" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS06-030 patch is NOT installed! (Vulns: 2K,XP/SP2-Mrxsmb.sys) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB908523" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS05-055 patch is NOT installed! (Vulns: 2K/SP4-APC Data-Free) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB890859" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS05-018 patch is NOT installed! (Vulns: 2K/SP3/4,XP/SP1/2-CSRSS) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB842526" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS04-019 patch is NOT installed! (Vulns: 2K/SP2/3/4-Utility Manager) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB835732" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS04-011 patch is NOT installed! (Vulns: 2K/SP2/3/4,XP/SP0/1-LSASS service BoF) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB841872" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS04-020 patch is NOT installed! (Vulns: 2K/SP4-POSIX) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB2975684" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS14-040 patch is NOT installed! (Vulns: 2K3/SP2,2K8/SP2,Vista/SP2,7/SP1-afd.sys Dangling Pointer) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB3136041" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS16-016 patch is NOT installed! (Vulns: 2K8/SP1/2,Vista/SP2,7/SP1-WebDAV to Address) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB3057191" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS15-051 patch is NOT installed! (Vulns: 2K3/SP2,2K8/SP2,Vista/SP2,7/SP1-win32k.sys) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB2989935" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS14-070 patch is NOT installed! (Vulns: 2K3/SP2-TCP/IP) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB2778930" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS13-005 patch is NOT installed! (Vulns: Vista,7,8,2008,2008R2,2012,RT-hwnd_broadcast) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB2850851" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS13-053 patch is NOT installed! (Vulns: 7SP0/SP1_x86-schlamperei) -IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB2870008" 1>NUL -IF "%expl%" == "yes" IF errorlevel 1 ECHO.MS13-081 patch is NOT installed! (Vulns: 7SP0/SP1_x86-track_popup_menu) -ECHO. -CALL :T_Progress 2 - -:DateAndTime -CALL :ColorLine " %E%33m[+]%E%97m DATE and TIME" -ECHO. [i] You may need to adjust your local date/time to exploit some vulnerability -date /T -time /T -ECHO. -CALL :T_Progress 2 - -:AuditSettings -CALL :ColorLine " %E%33m[+]%E%97m Audit Settings" -ECHO. [i] Check what is being logged -REG QUERY HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit 2>nul -ECHO. -CALL :T_Progress 1 - -:WEFSettings -CALL :ColorLine " %E%33m[+]%E%97m WEF Settings" -ECHO. [i] Check where are being sent the logs -REG QUERY HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\EventForwarding\SubscriptionManager 2>nul -ECHO. -CALL :T_Progress 1 - -:LAPSInstallCheck -CALL :ColorLine " %E%33m[+]%E%97m LAPS installed?" -ECHO. [i] Check what is being logged -REG QUERY "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft Services\AdmPwd" /v AdmPwdEnabled 2>nul -ECHO. -CALL :T_Progress 1 - -:LSAProtectionCheck -CALL :ColorLine " %E%33m[+]%E%97m LSA protection?" -ECHO. [i] Active if "1" -REG QUERY "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA" /v RunAsPPL 2>nul -CALL :T_Progress 1 - -:LSACredentialGuard -CALL :ColorLine " %E%33m[+]%E%97m Credential Guard?" -ECHO. [i] Active if "1" or "2" -REG QUERY "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA" /v LsaCfgFlags 2>nul -ECHO. -CALL :T_Progress 1 - -:LogonCredentialsPlainInMemory -CALL :ColorLine " %E%33m[+]%E%97m WDigest?" -ECHO. [i] Plain-text creds in memory if "1" -reg query HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest\UseLogonCredential 2>nul -ECHO. -CALL :T_Progress 1 - -:CachedCreds -CALL :ColorLine " %E%33m[+]%E%97m Number of cached creds" -ECHO. [i] You need System-rights to extract them -reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v CACHEDLOGONSCOUNT 2>nul -CALL :T_Progress 1 - -:UACSettings -CALL :ColorLine " %E%33m[+]%E%97m UAC Settings" -ECHO. [i] If the results read ENABLELUA REG_DWORD 0x1, part or all of the UAC components are on -ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#basic-uac-bypass-full-file-system-access -REG QUERY HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ /v EnableLUA 2>nul -ECHO. -CALL :T_Progress 1 - -:AVSettings -CALL :ColorLine " %E%33m[+]%E%97m Registered Anti-Virus(AV)" -WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List | more -ECHO.Checking for defender whitelisted PATHS -reg query "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" 2>nul -CALL :T_Progress 1 - -:PSSettings -CALL :ColorLine " %E%33m[+]%E%97m PowerShell settings" -ECHO.PowerShell v2 Version: -REG QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PowerShell\1\PowerShellEngine /v PowerShellVersion 2>nul -ECHO.PowerShell v5 Version: -REG QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PowerShell\3\PowerShellEngine /v PowerShellVersion 2>nul -ECHO.Transcriptions Settings: -REG QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\PowerShell\Transcription 2>nul -ECHO.Module logging settings: -REG QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ModuleLogging 2>nul -ECHO.Scriptblog logging settings: -REG QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging 2>nul -ECHO. -ECHO.PS default transcript history -dir %SystemDrive%\transcripts\ 2>nul -ECHO. -ECHO.Checking PS history file -dir "%APPDATA%\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt" 2>nul -ECHO. -CALL :T_Progress 3 - -:MountedDisks -CALL :ColorLine " %E%33m[+]%E%97m MOUNTED DISKS" -ECHO. [i] Maybe you find something interesting -(wmic logicaldisk get caption 2>nul | more) || (fsutil fsinfo drives 2>nul) -ECHO. -CALL :T_Progress 1 - -:Environment -CALL :ColorLine " %E%33m[+]%E%97m ENVIRONMENT" -ECHO. [i] Interesting information? -ECHO. -set -ECHO. -CALL :T_Progress 1 - -:InstalledSoftware -CALL :ColorLine " %E%33m[+]%E%97m INSTALLED SOFTWARE" -ECHO. [i] Some weird software? Check for vulnerabilities in unknow software installed -ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#software -ECHO. -dir /b "C:\Program Files" "C:\Program Files (x86)" | sort -reg query HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall /s | findstr InstallLocation | findstr ":\\" -reg query HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ /s | findstr InstallLocation | findstr ":\\" -IF exist C:\Windows\CCM\SCClient.exe ECHO.SCCM is installed (installers are run with SYSTEM privileges, many are vulnerable to DLL Sideloading) -ECHO. -CALL :T_Progress 2 - -:RemodeDeskCredMgr -CALL :ColorLine " %E%33m[+]%E%97m Remote Desktop Credentials Manager" -ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#remote-desktop-credential-manager -IF exist "%LOCALAPPDATA%\Local\Microsoft\Remote Desktop Connection Manager\RDCMan.settings" ECHO.Found: RDCMan.settings in %AppLocal%\Local\Microsoft\Remote Desktop Connection Manager\RDCMan.settings, check for credentials in .rdg files -ECHO. -CALL :T_Progress 1 - -:WSUS -CALL :ColorLine " %E%33m[+]%E%97m WSUS" -ECHO. [i] You can inject 'fake' updates into non-SSL WSUS traffic (WSUXploit) -ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#wsus -reg query HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate\ 2>nul | findstr /i "wuserver" | findstr /i "http://" -ECHO. -CALL :T_Progress 1 - -:RunningProcesses -CALL :ColorLine " %E%33m[+]%E%97m RUNNING PROCESSES" -ECHO. [i] Something unexpected is running? Check for vulnerabilities -ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#running-processes -tasklist /SVC -ECHO. -CALL :T_Progress 2 -ECHO. [i] Checking file permissions of running processes (File backdooring - maybe the same files start automatically when Administrator logs in) -for /f "tokens=2 delims='='" %%x in ('wmic process list full^|find /i "executablepath"^|find /i /v "system32"^|find ":"') do ( - for /f eol^=^"^ delims^=^" %%z in ('ECHO.%%x') do ( - icacls "%%z" 2>nul | findstr /i "(F) (M) (W) :\\" | findstr /i ":\\ everyone authenticated users todos %username%" && ECHO. - ) -) -ECHO. -ECHO. [i] Checking directory permissions of running processes (DLL injection) -for /f "tokens=2 delims='='" %%x in ('wmic process list full^|find /i "executablepath"^|find /i /v "system32"^|find ":"') do for /f eol^=^"^ delims^=^" %%y in ('ECHO.%%x') do ( - icacls "%%~dpy\" 2>nul | findstr /i "(F) (M) (W) :\\" | findstr /i ":\\ everyone authenticated users todos %username%" && ECHO. -) -ECHO. -CALL :T_Progress 3 - -:RunAtStartup -CALL :ColorLine " %E%33m[+]%E%97m RUN AT STARTUP" -ECHO. [i] Check if you can modify any binary that is going to be executed by admin or if you can impersonate a not found binary -ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#run-at-startup -::(autorunsc.exe -m -nobanner -a * -ct /accepteula 2>nul || wmic startup get caption,command 2>nul | more & ^ -reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Run 2>nul & ^ -reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce 2>nul & ^ -reg query HKCU\Software\Microsoft\Windows\CurrentVersion\Run 2>nul & ^ -reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce 2>nul & ^ -CALL :T_Progress 2 -icacls "C:\Documents and Settings\All Users\Start Menu\Programs\Startup" 2>nul | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%" && ECHO. & ^ -icacls "C:\Documents and Settings\All Users\Start Menu\Programs\Startup\*" 2>nul | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%" && ECHO. & ^ -icacls "C:\Documents and Settings\%username%\Start Menu\Programs\Startup" 2>nul | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%" && ECHO. & ^ -icacls "C:\Documents and Settings\%username%\Start Menu\Programs\Startup\*" 2>nul | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%" && ECHO. & ^ -CALL :T_Progress 2 -icacls "%programdata%\Microsoft\Windows\Start Menu\Programs\Startup" 2>nul | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%" && ECHO. & ^ -icacls "%programdata%\Microsoft\Windows\Start Menu\Programs\Startup\*" 2>nul | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%" && ECHO. & ^ -icacls "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup" 2>nul | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%" && ECHO. & ^ -icacls "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup\*" 2>nul | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%" && ECHO. & ^ -CALL :T_Progress 2 -schtasks /query /fo TABLE /nh | findstr /v /i "disable deshab informa") -ECHO. -CALL :T_Progress 2 - -:AlwaysInstallElevated -CALL :ColorLine " %E%33m[+]%E%97m AlwaysInstallElevated?" -ECHO. [i] If '1' then you can install a .msi file with admin privileges ;) -ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#alwaysinstallelevated -reg query HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated 2> nul -reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated 2> nul -ECHO. -CALL :T_Progress 2 - -:NetworkShares -CALL :ColorLine "%E%32m[*]%E%97m NETWORK" -CALL :ColorLine " %E%33m[+]%E%97m CURRENT SHARES" -net share -ECHO. -CALL :T_Progress 1 - -:NetworkInterfaces -CALL :ColorLine " %E%33m[+]%E%97m INTERFACES" -ipconfig /all -ECHO. -CALL :T_Progress 1 - -:NetworkUsedPorts -CALL :ColorLine " %E%33m[+]%E%97m USED PORTS" -ECHO. [i] Check for services restricted from the outside -netstat -ano | findstr /i listen -ECHO. -CALL :T_Progress 1 - -:NetworkFirewall -CALL :ColorLine " %E%33m[+]%E%97m FIREWALL" -netsh firewall show state -netsh firewall show config -ECHO. -CALL :T_Progress 2 - -:ARP -CALL :ColorLine " %E%33m[+]%E%97m ARP" -arp -A -ECHO. -CALL :T_Progress 1 - -:NetworkRoutes -CALL :ColorLine " %E%33m[+]%E%97m ROUTES" -route print -ECHO. -CALL :T_Progress 1 - -:WindowsHostsFile -CALL :ColorLine " %E%33m[+]%E%97m Hosts file" -type C:\WINDOWS\System32\drivers\etc\hosts | findstr /v "^#" -CALL :T_Progress 1 - -:DNSCache -CALL :ColorLine " %E%33m[+]%E%97m DNS CACHE" -ipconfig /displaydns | findstr "Record" | findstr "Name Host" -ECHO. -CALL :T_Progress 1 - -:WifiCreds -CALL :ColorLine " %E%33m[+]%E%97m WIFI" -for /f "tokens=4 delims=: " %%a in ('netsh wlan show profiles ^| find "Profile "') do (netsh wlan show profiles name=%%a key=clear | findstr "SSID Cipher Content" | find /v "Number" & ECHO.) -CALL :T_Progress 1 - -:BasicUserInfo -CALL :ColorLine "%E%32m[*]%E%97m BASIC USER INFO -ECHO. [i] Check if you are inside the Administrators group or if you have enabled any token that can be use to escalate privileges like SeImpersonatePrivilege, SeAssignPrimaryPrivilege, SeTcbPrivilege, SeBackupPrivilege, SeRestorePrivilege, SeCreateTokenPrivilege, SeLoadDriverPrivilege, SeTakeOwnershipPrivilege, SeDebbugPrivilege -ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#users-and-groups -ECHO. -CALL :ColorLine " %E%33m[+]%E%97m CURRENT USER" -net user %username% -net user %USERNAME% /domain 2>nul -whoami /all -ECHO. -CALL :T_Progress 2 - -:BasicUserInfoUsers -CALL :ColorLine " %E%33m[+]%E%97m USERS" -net user -ECHO. -CALL :T_Progress 1 - -:BasicUserInfoGroups -CALL :ColorLine " %E%33m[+]%E%97m GROUPS" -net localgroup -ECHO. -CALL :T_Progress 1 - -:BasicUserInfoAdminGroups -CALL :ColorLine " %E%33m[+]%E%97m ADMINISTRATORS GROUPS" -REM seems to be localised -net localgroup Administrators 2>nul -net localgroup Administradores 2>nul -ECHO. -CALL :T_Progress 1 - -:BasicUserInfoLoggedUser -CALL :ColorLine " %E%33m[+]%E%97m CURRENT LOGGED USERS" -quser -ECHO. -CALL :T_Progress 1 - -:KerberosTickets -CALL :ColorLine " %E%33m[+]%E%97m Kerberos Tickets" -klist -ECHO. -CALL :T_Progress 1 - -:CurrentClipboard -CALL :ColorLine " %E%33m[+]%E%97m CURRENT CLIPBOARD" -ECHO. [i] Any passwords inside the clipboard? -powershell -command "Get-Clipboard" 2>nul -ECHO. -CALL :T_Progress 1 - -:ServiceVulnerabilities -CALL :ColorLine "%E%32m[*]%E%97m SERVICE VULNERABILITIES" -:::sysinternals external tool -::ECHO. -::CALL :ColorLine " %E%33m[+]%E%97m SERVICE PERMISSIONS WITH accesschk.exe FOR 'Authenticated users', Everyone, BUILTIN\Users, Todos and CURRENT USER" -::ECHO. [i] If Authenticated Users have SERVICE_ALL_ACCESS or SERVICE_CHANGE_CONFIG or WRITE_DAC or WRITE_OWNER or GENERIC_WRITE or GENERIC_ALL, you can modify the binary that is going to be executed by the service and start/stop the service -::ECHO. [i] If accesschk.exe is not in PATH, nothing will be found here -::ECHO. [i] AUTHETICATED USERS -::accesschk.exe -uwcqv "Authenticated Users" * /accepteula 2>nul -::ECHO. [i] EVERYONE -::accesschk.exe -uwcqv "Everyone" * /accepteula 2>nul -::ECHO. [i] BUILTIN\Users -::accesschk.exe -uwcqv "BUILTIN\Users" * /accepteula 2>nul -::ECHO. [i] TODOS -::accesschk.exe -uwcqv "Todos" * /accepteula 2>nul -::ECHO. [i] %USERNAME% -::accesschk.exe -uwcqv %username% * /accepteula 2>nul -::ECHO. -::CALL :ColorLine " %E%33m[+]%E%97m SERVICE PERMISSIONS WITH accesschk.exe FOR *" -::ECHO. [i] Check for weird service permissions for unexpected groups" -::accesschk.exe -uwcqv * /accepteula 2>nul -CALL :T_Progress 1 -ECHO. - -:ServiceBinaryPermissions -CALL :ColorLine " %E%33m[+]%E%97m SERVICE BINARY PERMISSIONS WITH WMIC and ICACLS" -ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#services -for /f "tokens=2 delims='='" %%a in ('cmd.exe /c wmic service list full ^| findstr /i "pathname" ^|findstr /i /v "system32"') do ( - for /f eol^=^"^ delims^=^" %%b in ("%%a") do icacls "%%b" 2>nul | findstr /i "(F) (M) (W) :\\" | findstr /i ":\\ everyone authenticated users todos usuarios %username%" && ECHO. -) -ECHO. -CALL :T_Progress 1 - -:CheckRegistryModificationAbilities -CALL :ColorLine " %E%33m[+]%E%97m CHECK IF YOU CAN MODIFY ANY SERVICE REGISTRY" -ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#services -for /f %%a in ('reg query hklm\system\currentcontrolset\services') do del %temp%\reg.hiv >nul 2>&1 & reg save %%a %temp%\reg.hiv >nul 2>&1 && reg restore %%a %temp%\reg.hiv >nul 2>&1 && ECHO.You can modify %%a -ECHO. -CALL :T_Progress 1 - -:UnquotedServicePaths -CALL :ColorLine " %E%33m[+]%E%97m UNQUOTED SERVICE PATHS" -ECHO. [i] When the path is not quoted (ex: C:\Program files\soft\new folder\exec.exe) Windows will try to execute first 'C:\Program.exe', then 'C:\Program Files\soft\new.exe' and finally 'C:\Program Files\soft\new folder\exec.exe'. Try to create 'C:\Program Files\soft\new.exe' -ECHO. [i] The permissions are also checked and filtered using icacls -ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#services -for /f "tokens=2" %%n in ('sc query state^= all^| findstr SERVICE_NAME') do ( - for /f "delims=: tokens=1*" %%r in ('sc qc "%%~n" ^| findstr BINARY_PATH_NAME ^| findstr /i /v /l /c:"c:\windows\system32" ^| findstr /v /c:""""') do ( - ECHO.%%~s ^| findstr /r /c:"[a-Z][ ][a-Z]" >nul 2>&1 && (ECHO.%%n && ECHO.%%~s && icacls %%s | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%") && ECHO. - ) -) -CALL :T_Progress 2 -::wmic service get name,displayname,pathname,startmode | more | findstr /i /v "C:\\Windows\\system32\\" | findstr /i /v """ -ECHO. -::CALL :T_Progress 1 - -:PATHenvHijacking -CALL :ColorLine "%E%32m[*]%E%97m DLL HIJACKING in PATHenv variable" -ECHO. [i] Maybe you can take advantage of modifying/creating some binary in some of the following locations -ECHO. [i] PATH variable entries permissions - place binary or DLL to execute instead of legitimate -ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#dll-hijacking -for %%A in ("%path:;=";"%") do ( cmd.exe /c icacls "%%~A" 2>nul | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%" && ECHO. ) -ECHO. -CALL :T_Progress 1 - -:WindowsCredentials -CALL :ColorLine "%E%32m[*]%E%97m CREDENTIALS" -ECHO. -CALL :ColorLine " %E%33m[+]%E%97m WINDOWS VAULT" -ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#windows-vault -cmdkey /list -ECHO. -CALL :T_Progress 2 - -:DPAPIMasterKeys -CALL :ColorLine " %E%33m[+]%E%97m DPAPI MASTER KEYS" -ECHO. [i] Use the Mimikatz 'dpapi::masterkey' module with appropriate arguments (/rpc) to decrypt -ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#dpapi -powershell -command "Get-ChildItem %appdata%\Microsoft\Protect" 2>nul -powershell -command "Get-ChildItem %localappdata%\Microsoft\Protect" 2>nul -CALL :T_Progress 2 -CALL :ColorLine " %E%33m[+]%E%97m DPAPI MASTER KEYS" -ECHO. [i] Use the Mimikatz 'dpapi::cred' module with appropriate /masterkey to decrypt -ECHO. [i] You can also extract many DPAPI masterkeys from memory with the Mimikatz 'sekurlsa::dpapi' module -ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#dpapi -ECHO. -ECHO.Looking inside %appdata%\Microsoft\Credentials\ -ECHO. -dir /b/a %appdata%\Microsoft\Credentials\ 2>nul -CALL :T_Progress 2 -ECHO. -ECHO.Looking inside %localappdata%\Microsoft\Credentials\ -ECHO. -dir /b/a %localappdata%\Microsoft\Credentials\ 2>nul -CALL :T_Progress 2 -ECHO. - -:UnattendedFiles -CALL :ColorLine " %E%33m[+]%E%97m Unattended files" -IF EXIST %WINDIR%\sysprep\sysprep.xml ECHO.%WINDIR%\sysprep\sysprep.xml exists. -IF EXIST %WINDIR%\sysprep\sysprep.inf ECHO.%WINDIR%\sysprep\sysprep.inf exists. -IF EXIST %WINDIR%\sysprep.inf ECHO.%WINDIR%\sysprep.inf exists. -IF EXIST %WINDIR%\Panther\Unattended.xml ECHO.%WINDIR%\Panther\Unattended.xml exists. -IF EXIST %WINDIR%\Panther\Unattend.xml ECHO.%WINDIR%\Panther\Unattend.xml exists. -IF EXIST %WINDIR%\Panther\Unattend\Unattend.xml ECHO.%WINDIR%\Panther\Unattend\Unattend.xml exists. -IF EXIST %WINDIR%\Panther\Unattend\Unattended.xml ECHO.%WINDIR%\Panther\Unattend\Unattended.xml exists. -IF EXIST %WINDIR%\System32\Sysprep\unattend.xml ECHO.%WINDIR%\System32\Sysprep\unattend.xml exists. -IF EXIST %WINDIR%\System32\Sysprep\unattended.xml ECHO.%WINDIR%\System32\Sysprep\unattended.xml exists. -IF EXIST %WINDIR%\..\unattend.txt ECHO.%WINDIR%\..\unattend.txt exists. -IF EXIST %WINDIR%\..\unattend.inf ECHO.%WINDIR%\..\unattend.inf exists. -ECHO. -CALL :T_Progress 2 - -:SAMSYSBackups -CALL :ColorLine " %E%33m[+]%E%97m SAM and SYSTEM backups" -IF EXIST %WINDIR%\repair\SAM ECHO.%WINDIR%\repair\SAM exists. -IF EXIST %WINDIR%\System32\config\RegBack\SAM ECHO.%WINDIR%\System32\config\RegBack\SAM exists. -IF EXIST %WINDIR%\System32\config\SAM ECHO.%WINDIR%\System32\config\SAM exists. -IF EXIST %WINDIR%\repair\SYSTEM ECHO.%WINDIR%\repair\SYSTEM exists. -IF EXIST %WINDIR%\System32\config\SYSTEM ECHO.%WINDIR%\System32\config\SYSTEM exists. -IF EXIST %WINDIR%\System32\config\RegBack\SYSTEM ECHO.%WINDIR%\System32\config\RegBack\SYSTEM exists. -ECHO. -CALL :T_Progress 3 - -:McAffeeSitelist -CALL :ColorLine " %E%33m[+]%E%97m McAffee SiteList.xml" -cd %ProgramFiles% 2>nul -dir /s SiteList.xml 2>nul -cd %ProgramFiles(x86)% 2>nul -dir /s SiteList.xml 2>nul -cd "%windir%\..\Documents and Settings" 2>nul -dir /s SiteList.xml 2>nul -cd %windir%\..\Users 2>nul -dir /s SiteList.xml 2>nul -ECHO. -CALL :T_Progress 2 - -:GPPPassword -CALL :ColorLine " %E%33m[+]%E%97m GPP Password" -cd "%SystemDrive%\Microsoft\Group Policy\history" 2>nul -dir /s/b Groups.xml == Services.xml == Scheduledtasks.xml == DataSources.xml == Printers.xml == Drives.xml 2>nul -cd "%windir%\..\Documents and Settings\All Users\Application Data\Microsoft\Group Policy\history" 2>nul -dir /s/b Groups.xml == Services.xml == Scheduledtasks.xml == DataSources.xml == Printers.xml == Drives.xml 2>nul -ECHO. -CALL :T_Progress 2 - -:CloudCreds -CALL :ColorLine " %E%33m[+]%E%97m Cloud Credentials" -cd "%SystemDrive%\Users" -dir /s/b .aws == credentials == gcloud == credentials.db == legacy_credentials == access_tokens.db == .azure == accessTokens.json == azureProfile.json 2>nul -cd "%windir%\..\Documents and Settings" -dir /s/b .aws == credentials == gcloud == credentials.db == legacy_credentials == access_tokens.db == .azure == accessTokens.json == azureProfile.json 2>nul -ECHO. -CALL :T_Progress 2 - -:AppCMD -CALL :ColorLine " %E%33m[+]%E%97m AppCmd" -ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#appcmd.exe -IF EXIST %systemroot%\system32\inetsrv\appcmd.exe ECHO.%systemroot%\system32\inetsrv\appcmd.exe exists. -ECHO. -CALL :T_Progress 2 - -:RegFilesCredentials -CALL :ColorLine " %E%33m[+]%E%97m Files in registry that may contain credentials" -ECHO. [i] Searching specific files that may contains credentials. -ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#credentials-inside-files -ECHO.Looking inside HKCU\Software\ORL\WinVNC3\Password -reg query HKCU\Software\ORL\WinVNC3\Password 2>nul -CALL :T_Progress 2 -ECHO.Looking inside HKEY_LOCAL_MACHINE\SOFTWARE\RealVNC\WinVNC4/password -reg query HKEY_LOCAL_MACHINE\SOFTWARE\RealVNC\WinVNC4 /v password 2>nul -CALL :T_Progress 2 -ECHO.Looking inside HKLM\SOFTWARE\Microsoft\Windows NT\Currentversion\WinLogon -reg query "HKLM\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon" 2>nul | findstr /i "DefaultDomainName DefaultUserName DefaultPassword AltDefaultDomainName AltDefaultUserName AltDefaultPassword LastUsedUsername" -CALL :T_Progress 2 -ECHO.Looking inside HKLM\SYSTEM\CurrentControlSet\Services\SNMP -reg query HKLM\SYSTEM\CurrentControlSet\Services\SNMP /s 2>nul -CALL :T_Progress 2 -ECHO.Looking inside HKCU\Software\TightVNC\Server -reg query HKCU\Software\TightVNC\Server 2>nul -CALL :T_Progress 2 -ECHO.Looking inside HKCU\Software\SimonTatham\PuTTY\Sessions -reg query HKCU\Software\SimonTatham\PuTTY\Sessions /s 2>nul -CALL :T_Progress 2 -ECHO.Looking inside HKCU\Software\OpenSSH\Agent\Keys -CALL :T_Progress 2 -reg query HKCU\Software\OpenSSH\Agent\Keys /s 2>nul -cd %USERPROFILE% 2>nul && dir /s/b *password* == *credential* 2>nul -cd ..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\.. -dir /s/b /A:-D RDCMan.settings == *.rdg == SCClient.exe == *_history == .sudo_as_admin_successful == .profile == *bashrc == httpd.conf == *.plan == .htpasswd == .git-credentials == *.rhosts == hosts.equiv == Dockerfile == docker-compose.yml == appcmd.exe == TypedURLs == TypedURLsTime == History == Bookmarks == Cookies == "Login Data" == places.sqlite == key3.db == key4.db == credentials == credentials.db == access_tokens.db == accessTokens.json == legacy_credentials == azureProfile.json == unattend.txt == access.log == error.log == *.gpg == *.pgp == *config*.php == elasticsearch.y*ml == kibana.y*ml == *.p12 == *.der == *.csr == *.cer == known_hosts == id_rsa == id_dsa == *.ovpn == anaconda-ks.cfg == hostapd.conf == rsyncd.conf == cesi.conf == supervisord.conf == tomcat-users.xml == *.kdbx == KeePass.config == Ntds.dit == SAM == SYSTEM == FreeSSHDservice.ini == sysprep.inf == sysprep.xml == unattend.xml == unattended.xml == *vnc*.ini == *vnc*.c*nf* == *vnc*.txt == *vnc*.xml == groups.xml == services.xml == scheduledtasks.xml == printers.xml == drives.xml == datasources.xml == php.ini == https.conf == https-xampp.conf == httpd.conf == my.ini == my.cnf == access.log == error.log == server.xml == SiteList.xml == ConsoleHost_history.txt == setupinfo == setupinfo.bak 2>nul | findstr /v ".dll" -cd inetpub 2>nul && (dir /s/b web.config == *.log & cd ..) -ECHO. -CALL :T_Progress 2 - -:ExtendedDriveScan -if "%long%" == "true" ( - CALL :ColorLine " %E%33m[+]%E%97m REGISTRY WITH STRING pass OR pwd" - reg query HKLM /f passw /t REG_SZ /s - reg query HKCU /f passw /t REG_SZ /s - reg query HKLM /f pwd /t REG_SZ /s - reg query HKCU /f pwd /t REG_SZ /s - ECHO. - ECHO. [i] Iterating through the drives - ECHO. - for /f %%x in ('wmic logicaldisk get name^| more') do ( - set tdrive=%%x - if "!tdrive:~1,2!" == ":" ( - %%x - CALL :ColorLine " %E%33m[+]%E%97m FILES THAT CONTAINS THE WORD PASSWORD WITH EXTENSION: .xml .ini .txt *.cfg *.config" - findstr /s/n/m/i password *.xml *.ini *.txt *.cfg *.config 2>nul | findstr /v /i "\\AppData\\Local \\WinSxS ApnDatabase.xml \\UEV\\InboxTemplates \\Microsoft.Windows.Cloud \\Notepad\+\+\\ vmware cortana alphabet \\7-zip\\" 2>nul - ECHO. - CALL :ColorLine " %E%33m[+]%E%97m FILES WHOSE NAME CONTAINS THE WORD PASS CRED or .config not inside \Windows\" - dir /s/b *pass* == *cred* == *.config* == *.cfg 2>nul | findstr /v /i "\\windows\\" - ECHO. - ) - ) - CALL :T_Progress 2 -) ELSE ( - CALL :T_Progress 2 -) -TITLE WinPEAS - Windows local Privilege Escalation Awesome Script - Idle -ECHO.--- -ECHO.Scan complete. -PAUSE >NUL -EXIT /B - -:::-Subroutines - -:SetOnce -REM :: ANSI escape character is set once below - for ColorLine Subroutine -SET "E=0x1B[" -SET "PercentageTrack=0" -EXIT /B - -:T_Progress -SET "Percentage=%~1" -SET /A "PercentageTrack=PercentageTrack+Percentage" -TITLE WinPEAS - Windows local Privilege Escalation Awesome Script - Scanning... !PercentageTrack!%% -EXIT /B - -:ColorLine -SET "CurrentLine=%~1" -FOR /F "delims=" %%A IN ('FORFILES.EXE /P %~dp0 /M %~nx0 /C "CMD /C ECHO.!CurrentLine!"') DO ECHO.%%A -EXIT /B diff --git a/winPEAS/winPEASps1/winPEAS.ps1 b/winPEAS/winPEASps1/winPEAS.ps1 index 23a9570..100d642 100644 --- a/winPEAS/winPEASps1/winPEAS.ps1 +++ b/winPEAS/winPEASps1/winPEAS.ps1 @@ -5,6 +5,8 @@ For the legal enumeration of windows based computers that you either own or are approved to run this script on .EXAMPLE .\WinPeas.ps1 + # Add Time stamps to each command + .\WinPeas.ps1 $debugTimeStamp .NOTES Version: 1.0 PEASS-ng Original Author: carlospolop @@ -23,7 +25,7 @@ param ( [Parameter()] [switch] - $debug + $debugTimeStamp ) # Gather KB from all patches installed @@ -114,7 +116,7 @@ Function Get-ClipBoardText { $text = [Windows.Clipboard]::GetText() if ($text) { Write-Host "" - if ($debug) { TimeElapsed } + if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| ClipBoard text found:" Write-Host $text @@ -385,7 +387,7 @@ Write-Host "You can find a Windows local PE Checklist here: https://book.hacktri ######################## SYSTEM INFORMATION ######################## Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host "====================================||SYSTEM INFORMATION ||====================================" "The following information is curated. To get a full list of system information, run the cmdlet get-computerinfo" @@ -395,7 +397,7 @@ systeminfo.exe #Hotfixes installed sorted by date Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| WINDOWS HOTFIXES" Write-Host "=| Check if windows is vulnerable with Watson https://github.com/rasta-mouse/Watson" -ForegroundColor Yellow Write-Host "Possible exploits (https://github.com/codingo/OSCP-2/blob/master/Windows/WinPrivCheck.bat)" -ForegroundColor Yellow @@ -405,7 +407,7 @@ $Hotfix | Format-Table -AutoSize #Show all unique updates installed Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| ALL UPDATES INSTALLED" @@ -467,7 +469,7 @@ $FinalHotfixList | Format-Table -AutoSize Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Drive Info" # Load the System.Management assembly Add-Type -AssemblyName System.Management @@ -494,25 +496,25 @@ foreach ($drive in $systemDrives) { Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Antivirus Detection (attemping to read exclusions as well)" WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName Get-ChildItem 'registry::HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions' -ErrorAction SilentlyContinue Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| NET ACCOUNTS Info" net accounts ######################## REGISTRY SETTING CHECK ######################## Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| REGISTRY SETTINGS CHECK" Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Audit Log Settings" #Check audit registry if ((Test-Path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Audit\).Property) { @@ -524,7 +526,7 @@ else { Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Windows Event Forward (WEF) registry" if (Test-Path HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding\SubscriptionManager) { Get-Item HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding\SubscriptionManager @@ -535,7 +537,7 @@ else { Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| LAPS Check" if (Test-Path 'C:\Program Files\LAPS\CSE\Admpwd.dll') { Write-Host "LAPS dll found on this machine at C:\Program Files\LAPS\CSE\" -ForegroundColor Green } elseif (Test-Path 'C:\Program Files (x86)\LAPS\CSE\Admpwd.dll' ) { Write-Host "LAPS dll found on this machine at C:\Program Files (x86)\LAPS\CSE\" -ForegroundColor Green } @@ -544,7 +546,7 @@ if ((Get-ItemProperty HKLM:\Software\Policies\Microsoft Services\AdmPwd -ErrorAc Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| WDigest Check" $WDigest = (Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest).UseLogonCredential switch ($WDigest) { @@ -555,7 +557,7 @@ switch ($WDigest) { Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| LSA Protection Check" $RunAsPPL = (Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Control\LSA).RunAsPPL $RunAsPPLBoot = (Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Control\LSA).RunAsPPLBoot @@ -569,7 +571,7 @@ if ($RunAsPPLBoot) { Write-Host "RunAsPPLBoot: $RunAsPPLBoot" } Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Credential Guard Check" $LsaCfgFlags = (Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Control\LSA).LsaCfgFlags switch ($LsaCfgFlags) { @@ -581,7 +583,7 @@ switch ($LsaCfgFlags) { Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Cached WinLogon Credentials Check" if (Test-Path "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon") { (Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" -Name "CACHEDLOGONSCOUNT").CACHEDLOGONSCOUNT @@ -590,7 +592,7 @@ if (Test-Path "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon") { } Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Additonal Winlogon Credentials Check" (Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon").DefaultDomainName @@ -602,7 +604,7 @@ Write-Host -ForegroundColor Blue "=========|| Additonal Winlogon Credentials Che Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| RDCMan Settings Check" if (Test-Path "$env:USERPROFILE\appdata\Local\Microsoft\Remote Desktop Connection Manager\RDCMan.settings") { @@ -612,7 +614,7 @@ else { Write-Host "No RCDMan.Settings found." } Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| RDP Saved Connections Check" Write-Host "HK_Users" @@ -633,7 +635,7 @@ if (Test-Path "registry::HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Cl else { Write-Host "Terminal Server Client not found in HCKU" } Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Putty Stored Credentials Check" if (Test-Path HKCU:\SOFTWARE\SimonTatham\PuTTY\Sessions) { @@ -650,14 +652,14 @@ else { Write-Host "No putty credentials found in HKCU:\SOFTWARE\SimonTatham\PuTT Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| SSH Key Checks" Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| If found:" Write-Host "https://blog.ropnop.com/extracting-ssh-private-keys-from-windows-10-ssh-agent/" -ForegroundColor Yellow Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Checking Putty SSH KNOWN HOSTS" if (Test-Path HKCU:\Software\SimonTatham\PuTTY\SshHostKeys) { Write-Host "$((Get-Item -Path HKCU:\Software\SimonTatham\PuTTY\SshHostKeys).Property)" @@ -665,32 +667,32 @@ if (Test-Path HKCU:\Software\SimonTatham\PuTTY\SshHostKeys) { else { Write-Host "No putty ssh keys found" } Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Checking for OpenSSH Keys" if (Test-Path HKCU:\Software\OpenSSH\Agent\Keys) { Write-Host "OpenSSH keys found. Try this for decryption: https://github.com/ropnop/windows_sshagent_extract" -ForegroundColor Yellow } else { Write-Host "No OpenSSH Keys found." } Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Checking for WinVNC Passwords" if ( Test-Path "HKCU:\Software\ORL\WinVNC3\Password") { Write-Host " WinVNC found at HKCU:\Software\ORL\WinVNC3\Password" }else { Write-Host "No WinVNC found." } Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Checking for SNMP Passwords" if ( Test-Path "HKLM:\SYSTEM\CurrentControlSet\Services\SNMP" ) { Write-Host "SNPM Key found at HKLM:\SYSTEM\CurrentControlSet\Services\SNMP" }else { Write-Host "No SNPM found." } Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Checking for TightVNC Passwords" if ( Test-Path "HKCU:\Software\TightVNC\Server") { Write-Host "TightVNC key found at HKCU:\Software\TightVNC\Server" }else { Write-Host "No TightVNC found." } Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| UAC Settings" if ((Get-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System).EnableLUA -eq 1) { Write-Host "EnableLUA is equal to 1. Part or all of the UAC components are on." @@ -700,7 +702,7 @@ else { Write-Host "EnableLUA value not equal to 1" } Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Recently Run Commands (WIN+R)" Get-ChildItem HKU:\ -ErrorAction SilentlyContinue | ForEach-Object { @@ -718,7 +720,7 @@ Get-ChildItem HKU:\ -ErrorAction SilentlyContinue | ForEach-Object { } Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========||HKCU Recently Run Commands" $property = (Get-Item "HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU" -ErrorAction SilentlyContinue).Property foreach ($p in $property) { @@ -726,7 +728,7 @@ foreach ($p in $property) { } Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Always Install Elevated Check" Write-Host "Checking Windows Installer Registry (will populate if the key exists)" @@ -744,7 +746,7 @@ if ((Get-ItemProperty HKCU:\SOFTWARE\Policies\Microsoft\Windows\Installer -Error Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| PowerShell Info" (Get-ItemProperty registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PowerShell\1\PowerShellEngine).PowerShellVersion | ForEach-Object { @@ -756,7 +758,7 @@ Write-Host -ForegroundColor Blue "=========|| PowerShell Info" Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| PowerShell Registry Transcript Check" if (Test-Path HKCU:\Software\Policies\Microsoft\Windows\PowerShell\Transcription) { @@ -774,7 +776,7 @@ if (Test-Path HKLM:\Wow6432Node\Software\Policies\Microsoft\Windows\PowerShell\T Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| PowerShell Module Log Check" if (Test-Path HKCU:\Software\Policies\Microsoft\Windows\PowerShell\ModuleLogging) { Get-Item HKCU:\Software\Policies\Microsoft\Windows\PowerShell\ModuleLogging @@ -791,7 +793,7 @@ if (Test-Path HKLM:\Wow6432Node\Software\Policies\Microsoft\Windows\PowerShell\M Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| PowerShell Script Block Log Check" if ( Test-Path HKCU:\Software\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging) { @@ -809,7 +811,7 @@ if ( Test-Path HKLM:\Wow6432Node\Software\Policies\Microsoft\Windows\PowerShell\ Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| WSUS check for http and UseWAServer = 1, if true, might be vulnerable to exploit" Write-Host "https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#wsus" -ForegroundColor Yellow if (Test-Path HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate) { @@ -821,7 +823,7 @@ if ((Get-ItemProperty HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Internet Settings HKCU / HKLM" $property = (Get-Item "HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings" -ErrorAction SilentlyContinue).Property @@ -838,26 +840,26 @@ foreach ($p in $property) { ######################## PROCESS INFORMATION ######################## Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| RUNNING PROCESSES" Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Checking user permissions on running processes" Get-Process | Select-Object Path -Unique | ForEach-Object { Start-ACLCheck -Target $_.path } #TODO, vulnerable system process running that we have access to. Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| System processes" Start-Process tasklist -ArgumentList '/v /fi "username eq system"' -Wait -NoNewWindow ######################## SERVICES ######################## Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| SERVICE path vulnerable check" Write-Host "Checking for vulnerable service .exe" # Gathers all services running and stopped, based on .exe and shows the AccessControlList @@ -873,7 +875,7 @@ foreach ( $h in ($UniqueServices | Select-Object -Unique).GetEnumerator()) { ######################## UNQUOTED SERVICE PATH CHECK ############ Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Checking for Unquoted Service Paths" # All credit to Ivan-Sincek # https://github.com/ivan-sincek/unquoted-service-paths/blob/master/src/unquoted_service_paths_mini.ps1 @@ -883,7 +885,7 @@ UnquotedServicePathCheck ######################## REGISTRY SERVICE CONFIGURATION CHECK ### Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Checking Service Registry Permissions" Write-Host "This will take some time." @@ -895,12 +897,12 @@ Get-ChildItem 'HKLM:\System\CurrentControlSet\services\' | ForEach-Object { ######################## SCHEDULED TASKS ######################## Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| SCHEDULED TASKS vulnerable check" #Scheduled tasks audit Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Testing access to c:\windows\system32\tasks" if (Get-ChildItem "c:\windows\system32\tasks" -ErrorAction SilentlyContinue) { Write-Host "Access confirmed, may need futher investigation" @@ -936,7 +938,7 @@ else { ######################## STARTUP APPLIICATIONS ######################### Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| STARTUP APPLICATIONS Vulnerable Check" "Check if you can modify any binary that is going to be executed by admin or if you can impersonate a not found binary" Write-Host "https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#run-at-startup" -ForegroundColor Yellow @@ -957,7 +959,7 @@ Write-Host "https://book.hacktricks.xyz/windows-hardening/windows-local-privileg } } Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| STARTUP APPS Registry Check" @("registry::HKLM\Software\Microsoft\Windows\CurrentVersion\Run", @@ -979,7 +981,7 @@ Write-Host -ForegroundColor Blue "=========|| STARTUP APPS Registry Check" ######################## INSTALLED APPLICATIONS ######################## Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| INSTALLED APPLICATIONS" Write-Host "Generating list of installed applications" @@ -990,7 +992,7 @@ ForEach-Object { Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| LOOKING FOR BASH.EXE" Get-ChildItem C:\Windows\WinSxS\ -Filter "amd64_microsoft-windows-lxss-bash*" | ForEach-Object { Write-Host $((Get-ChildItem $_.FullName -Recurse -Filter "*bash.exe*").FullName) @@ -999,7 +1001,7 @@ Get-ChildItem C:\Windows\WinSxS\ -Filter "amd64_microsoft-windows-lxss-bash*" | Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| LOOKING FOR SCCM CLIENT" $result = Get-WmiObject -Namespace "root\ccm\clientSDK" -Class CCM_Application -Property * -ErrorAction SilentlyContinue | Select-Object Name, SoftwareVersion if ($result) { $result } @@ -1009,34 +1011,34 @@ else { Write-Host "Not Installed." } ######################## NETWORK INFORMATION ######################## Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| NETWORK INFORMATION" Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| HOSTS FILE" Write-Host "Get content of etc\hosts file" Get-Content "c:\windows\system32\drivers\etc\hosts" Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| IP INFORMATION" # Get all v4 and v6 addresses Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Ipconfig ALL" Start-Process ipconfig.exe -ArgumentList "/all" -Wait -NoNewWindow Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| DNS Cache" ipconfig /displaydns | Select-String "Record" | ForEach-Object { Write-Host $('{0}' -f $_) } Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| LISTENING PORTS" # running netstat as powershell is too slow to print to console @@ -1044,21 +1046,21 @@ Start-Process NETSTAT.EXE -ArgumentList "-ano" -Wait -NoNewWindow Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| ARP Table" # Arp table info Start-Process arp -ArgumentList "-A" -Wait -NoNewWindow Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Routes" # Route info Start-Process route -ArgumentList "print" -Wait -NoNewWindow Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Network Adapter info" # Network Adapter info @@ -1074,7 +1076,7 @@ Get-NetAdapter | ForEach-Object { Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Checking for WiFi passwords" # Select all wifi adapters, then pull the SSID along with the password @@ -1084,13 +1086,13 @@ Write-Host -ForegroundColor Blue "=========|| Checking for WiFi passwords" Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Enabled firewall rules - displaying command only - it can overwrite the display buffer" Write-Host -ForegroundColor Blue "=========|| show all rules with: netsh advfirewall firewall show rule dir=in name=all" # Route info Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| SMB SHARES" Write-Host "Will enumerate SMB Shares and Access if any are available" @@ -1106,7 +1108,7 @@ Get-SmbShare | Get-SmbShareAccess | ForEach-Object { ######################## USER INFO ######################## Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| USER INFO" Write-Host "== || Generating List of all Administrators, Users and Backup Operators (if any exist)" @@ -1121,7 +1123,7 @@ Start-Process net -ArgumentList 'localgroup "Backup Operators"' -Wait -NoNewWind Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| USER DIRECTORY ACCESS CHECK" Get-ChildItem C:\Users\* | ForEach-Object { if (Get-ChildItem $_.FullName -ErrorAction SilentlyContinue) { @@ -1131,10 +1133,10 @@ Get-ChildItem C:\Users\* | ForEach-Object { #Whoami Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| WHOAMI INFO" Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Check Token access here: https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation/privilege-escalation-abusing-tokens" -ForegroundColor yellow Write-Host -ForegroundColor Blue "=========|| Check if you are inside the Administrators group or if you have enabled any token that can be use to escalate privileges like SeImpersonatePrivilege, SeAssignPrimaryPrivilege, SeTcbPrivilege, SeBackupPrivilege, SeRestorePrivilege, SeCreateTokenPrivilege, SeLoadDriverPrivilege, SeTakeOwnershipPrivilege, SeDebbugPrivilege" Write-Host "https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#users-and-groups" -ForegroundColor Yellow @@ -1142,7 +1144,7 @@ Start-Process whoami.exe -ArgumentList "/all" -Wait -NoNewWindow Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Cloud Credentials Check" $Users = (Get-ChildItem C:\Users).Name $CCreds = @(".aws\credentials", @@ -1159,7 +1161,7 @@ foreach ($u in $users) { Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| APPcmd Check" if (Test-Path ("$Env:SystemRoot\System32\inetsrv\appcmd.exe")) { Write-Host "https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#appcmd.exe" -ForegroundColor Yellow @@ -1168,7 +1170,7 @@ if (Test-Path ("$Env:SystemRoot\System32\inetsrv\appcmd.exe")) { Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| OpenVPN Credentials Check" $keys = Get-ChildItem "HKCU:\Software\OpenVPN-GUI\configs" -ErrorAction SilentlyContinue @@ -1191,7 +1193,7 @@ if ($Keys) { Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| PowerShell History (Password Search Only)" Write-Host "=|| PowerShell Console History" @@ -1209,7 +1211,7 @@ if (Test-Path $env:SystemDrive\transcripts\) { "Default transcripts found at $($ # Enumerating Environment Variables Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| ENVIRONMENT VARIABLES " Write-Host "Maybe you can take advantage of modifying/creating a binary in some of the following locations" Write-Host "PATH variable entries permissions - place binary or DLL to execute instead of legitimate" @@ -1219,7 +1221,7 @@ Get-ChildItem env: | Format-Table -Wrap Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Sticky Notes Check" if (Test-Path "C:\Users\$env:USERNAME\AppData\Local\Packages\Microsoft.MicrosoftStickyNotes*\LocalState\plum.sqlite") { Write-Host "Sticky Notes database found. Could have credentials in plain text: " @@ -1229,14 +1231,14 @@ if (Test-Path "C:\Users\$env:USERNAME\AppData\Local\Packages\Microsoft.Microsoft # Check for Cached Credentials # https://community.idera.com/database-tools/powershell/powertips/b/tips/posts/getting-cached-credentials Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Cached Credentials Check" Write-Host "https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#windows-vault" -ForegroundColor Yellow cmdkey.exe /list Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Checking for DPAPI RPC Master Keys" Write-Host "Use the Mimikatz 'dpapi::masterkey' module with appropriate arguments (/rpc) to decrypt" Write-Host "https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#dpapi" -ForegroundColor Yellow @@ -1258,7 +1260,7 @@ if ( Test-Path "$appdataLocal\Protect\") { Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Checking for DPAPI Cred Master Keys" Write-Host "Use the Mimikatz 'dpapi::cred' module with appropriate /masterkey to decrypt" Write-Host "You can also extract many DPAPI masterkeys from memory with the Mimikatz 'sekurlsa::dpapi' module" @@ -1273,31 +1275,31 @@ if ( Test-Path "$appdataLocal\Credentials\") { Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Current Logged on Users" try { quser }catch { Write-Host "'quser' command not not present on system" } Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Remote Sessions" try { qwinsta } catch { Write-Host "'qwinsta' command not present on system" } Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Kerberos tickets (does require admin to interact)" try { klist } catch { Write-Host "No active sessions" } Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Printing ClipBoard (if any)" Get-ClipBoardText ######################## File/Credentials check ######################## Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Unattended Files Check" @("C:\Windows\sysprep\sysprep.xml", "C:\Windows\sysprep\sysprep.inf", @@ -1318,7 +1320,7 @@ Write-Host -ForegroundColor Blue "=========|| Unattended Files Check" ######################## GROUP POLICY RELATED CHECKS ######################## Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| SAM / SYSTEM Backup Checks" @( @@ -1335,7 +1337,7 @@ Write-Host -ForegroundColor Blue "=========|| SAM / SYSTEM Backup Checks" Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Group Policy Password Check" $GroupPolicy = @("Groups.xml", "Services.xml", "Scheduledtasks.xml", "DataSources.xml", "Printers.xml", "Drives.xml") @@ -1348,7 +1350,7 @@ if (Test-Path "$env:SystemDrive\Documents and Settings\All Users\Application Dat } Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Recycle Bin TIP:" Write-Host "if credentials are found in the recycle bin, tool from nirsoft may assist: http://www.nirsoft.net/password_recovery_tools.html" -ForegroundColor Yellow @@ -1379,18 +1381,18 @@ foreach ($r in $regPath) { } } } - if ($debug) { TimeElapsed } + if ($debugTimeStamp) { TimeElapsed } Write-Host "Finished $r" } Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Password Check in Files" # Looking through the entire computer for passwords $Drives = Get-PSDrive | Where-Object { $_.Root -like "*:\" } $fileExtensions = @("*.xml", "*.txt", "*.conf","*.config", "*.cfg", "*.ini", ".y*ml", "*.log", "*.bak") Write-Host "" -if ($debug) { TimeElapsed } +if ($debugTimeStamp) { TimeElapsed } Write-Host -ForegroundColor Blue "=========|| Password Check. Starting at root of each drive. This will take some time. Like, grab a coffee or tea." Write-Host -ForegroundColor Blue "=========|| Looking through each drive, searching for $fileExtensions" # Also looks for MCaffee site list while looping through the drives.