Post Compromise

This room is part of tryhackme's lay of land room from red teaming path and focuses on enumeration done after post compromise .

Network enumeration

This command is used to display active network connections and their respective network addresses in numerical form.

netstat -n

You can also use (not recommended as it will display all active ports on the system and might trigger some security thing)

netstat -na

Looking for arp table . It can be used to know about different devices present on the network and might be usefully in pivoting / routing

arp -a 

Active directory enum

You can use this command to find the name of domain the user is part of in active diretory environment .

systeminfo | findstr Domain

The following are Active Directory Administrators accounts:

Account Name
Description

BUILTIN\Administrator

Local admin access on a domain controller

Domain Admins

Administrative access to all resources in the domain

Enterprise Admins

Available only in the forest root

Schema Admins

Capable of modifying domain/forest; useful for red teamers

Server Operators

Can manage domain servers

Account Operators

Can manage users that are not in privileged groups

One can use this command to get a list of all active user's on active directrory environment

One can also use SearchBase option, we specify a specific Common-Name CN in the active directory.

Host security (Antivirus)

Looking for present anti-virus on the machine

Note:- It might not work on some machines as securitycenter2 might not be present , But it should work on almost every Windows workstaion

Looking for windows defender status

One can use this command to get more information like ant-spyware etc...

One can use this command to look for Host based firewall status

Or use this command to just find about if it is enabled or not

Enumerating Security Solutions

One can use this command to find out available event logs on the machine

One can use this command to find if sysmon is running on the machine or not (Sysmon is a logging tool which is used by blue team folks to monitor different events)

Or by checking the registry

You can also use this command to look for Sysmon's config file

For EDR

You can use the following tools https://github.com/PwnDexter/SharpEDRChecker & https://github.com/PwnDexter/Invoke-EDRChecker

Application & Services

Looking for installed program

Looking for hiddent files

You can list all the running services by using this command

We can also look for specific service process information

Then you can use netstat to look for open ports for that specific service

Last updated