Windows
Unnattended Installation
Unattend.xml is an answer file for installation. The files may contain encoded or plain-text credentials and other sensitive information.
These files contain base64-encoded user account and system information
C:\Windows\Panther\Unattend.xml
C:\Windows\Panther\Autounattend.xml
Windows Credential Manager
In the production server for some operation, an admin requires to enter the credentials repeatedly. Also, users save their credentials to the Credential Manager for quick access. Credential manager stores Web and Windows Credentials.
Assume that for a moment an attacker got access to the system physically or remotely. Then, it would be easy to access those credentials and to run an application with it.
For checking al the stored credentials:
We will not see the password, but we can use runas to authenticate as the user which have credentials:
PowerShell History
PowerShell.exe terminal stores all the PS commands history in a text file. When an administrator has used hard-coded credentials to perform any operation on the regular user i.e student user environment using PowerShell then, it would become necessary to clean the PowerShell command history. If an administrator forgets to clean up the history, then the admin user has exposed some sensitive information like credentials, configuration settings, etc.
The default location for the PowerShell command history:
Process Memory
To check the processes running:
Then you can dump all the proccess information:
Then use strings to check passwords:
Registry Autoruns
Autoruns for system startup:
Autoruns for user login
Configurations for Windows Services which can run with elevated privileges
Enumeration
To check the programs which are configured to start on system startup:
If a normal user haves Full Control we can use as a privilege escalation technique
ACLS
We can check for ACL misconfigurations using icacls
If we have Full controll against a folder, we can grant this user permissions for accessing a file inside this folder using this command:
SYSVOL & GPP (MS14-025)
AlwayInstalled
Enumerate common registry keys and if AlwaysInstallElevated is enabled we can exploit that
Last updated