This script is designed to assist in the detection of possible misconfigurations that may lead to privilege escalation on a Windows system. I use this as a "first view" script to gather basic system config information and detect "easy win" vulnerabilities - it is not intended to replace more comprehensive tools, such as WinPEAS. It provides a quick overview of system information, user and group details, file permissions, network configurations, running processes, scheduled tasks, and potential security issues.
The Beady-eyed Mouse is a cute little mouse found in Columbia and Ecuador - with those beady eyes, if a mouse was going to be good at privilege esealation, it would be this one :)
Powershell 3.0 or newer
Run the script on a Windows system with the following command:
powershell mouse.ps1
- System Informaion: Collects system information such as OS version, hotfixes, and system boot time.
- User Information: Retrieves user details, including current user, groups, privileges, and command history.
- Network: Gathers network information, DNS settings, ARP cache, and network connections.
- Firewall / AV: Checks firewall and antivirus status, app locker policies, and firewall configurations.
- Processes: Displays running processes, services, and registry items.
- Searches for interesting files, directories, and configurations.
- Checks for scheduled tasks, startup commands, and named pipes.
- Highlights potential privilege escalation routes and useful information for further investigation.
This code is provided for educational and ethical security testing purposes only. It should be used responsibly and only in environments where explicit authorization has been granted. Unauthorized or malicious use is strictly prohibited. By using this code, you agree to adhere to all applicable laws, regulations, and ethical standards applicable in your jurisdiction. The creators and contributors disclaim any liability for any damages or consequences arising from the misuse or unauthorized use of this code.
An example from the Support HTB box
.--, .--,
( ( \.---./ ) )
".__/o o\__."
{= ^ =}
> - <
___________.""-------"".____________
/ \
\ Beadey Eye Mouse /
/ Now Scanning! \
\ / __
/iucnredlist.org/species/21770/22366419\ _.-" .
\______________ __________ ____________/ .-~^ ~--"
___)( )(___ -.___."
(((__) (__)))
=====================================================
Beadey Eye (Windows) Mouse
Running as user: SUPPORT\support
Started at: 12/3/2023 3:30:28 AM
Items in Red Are potential privesc routes, check them out!
Items in Yellow Could be useful, have a look
Items in Green Are information which might help with other approaches
=============================
###-SYSTEM INFORMATION-###
=============================
()-().----. .
\"/ ___ ;________./
^^ ^^
=============================
=============================
Basic System Information
=============================
powershell.exe : Program 'systeminfo.exe' failed to run: Access is deniedAt line:1 char:1
+ CategoryInfo : NotSpecified: (Program 'system...t line:1 char:1:String) [], RemoteException
+ FullyQualifiedErrorId : NativeCommandError
+ systeminfo+ ~~~~~~~~~~.At line:1 char:1+ systeminfo+ ~~~~~~~~~~ + CategoryInfo : ResourceUnavailable: (:) [], ApplicationFailedException + FullyQualifiedErrorId : NativeCommandFailed
=============================
Environment Variables
=============================
Key Value
--- -----
ALLUSERSPROFILE C:\ProgramData
APPDATA C:\Users\support\AppData\Roaming
CommonProgramFiles C:\Program Files\Common Files
CommonProgramFiles(x86) C:\Program Files (x86)\Common Files
CommonProgramW6432 C:\Program Files\Common Files
COMPUTERNAME DC
ComSpec C:\Windows\system32\cmd.exe
DriverData C:\Windows\System32\Drivers\DriverData
LOCALAPPDATA C:\Users\support\AppData\Local
NUMBER_OF_PROCESSORS 2
OS Windows_NT
Path C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\Syst...
PATHEXT .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC;.CPL
PROCESSOR_ARCHITECTURE AMD64
PROCESSOR_IDENTIFIER Intel64 Family 6 Model 85 Stepping 7, GenuineIntel
PROCESSOR_LEVEL 6
PROCESSOR_REVISION 5507
ProgramData C:\ProgramData
ProgramFiles C:\Program Files
ProgramFiles(x86) C:\Program Files (x86)
ProgramW6432 C:\Program Files
PSModulePath C:\Users\support\Documents\WindowsPowerShell\Modules;C:\Program Files\W...
PUBLIC C:\Users\Public
SystemDrive C:
SystemRoot C:\Windows
TEMP C:\Users\support\AppData\Local\Temp
TMP C:\Users\support\AppData\Local\Temp
USERDNSDOMAIN support.htb
USERDOMAIN SUPPORT
USERNAME support
USERPROFILE C:\Users\support
windir C:\Windows
=============================
###-USER INFORMATION-###
=============================
()-().----. .
\"/ ___ ;________./
^^ ^^
=============================
=============================
Current User
=============================
SUPPORT\support
=============================
Current User Privileges
=============================
PRIVILEGES INFORMATION
----------------------
Privilege Name Description State
============================= ============================== =======
SeMachineAccountPrivilege Add workstations to domain Enabled
SeChangeNotifyPrivilege Bypass traverse checking Enabled
SeIncreaseWorkingSetPrivilege Increase a process working set Enabled
=============================
Current User Groups
=============================
GROUP INFORMATION
-----------------
Group Name Type SID Attributes
========================================== ================ ============================================= ==================================================
Everyone Well-known group S-1-1-0 Mandatory group, Enabled by default, Enabled group
BUILTIN\Remote Management Users Alias S-1-5-32-580 Mandatory group, Enabled by default, Enabled group
BUILTIN\Users Alias S-1-5-32-545 Mandatory group, Enabled by default, Enabled group
BUILTIN\Pre-Windows 2000 Compatible Access Alias S-1-5-32-554 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\NETWORK Well-known group S-1-5-2 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\Authenticated Users Well-known group S-1-5-11 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\This Organization Well-known group S-1-5-15 Mandatory group, Enabled by default, Enabled group
SUPPORT\Shared Support Accounts Group S-1-5-21-1677581083-3380853377-188903654-1103 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\NTLM Authentication Well-known group S-1-5-64-10 Mandatory group, Enabled by default, Enabled group
Mandatory Label\Medium Mandatory Level Label S-1-16-8192
=============================
Current User Command History
=============================
=============================
Local Users
=============================
Name Enabled LastLogon
---- ------- ---------
Administrator True 12/3/2023 3:29:17 AM
Guest True
krbtgt False
ldap True
support True
smith.rosario True
hernandez.stanley True
wilson.shelby True
anderson.damian True
thomas.raphael True
levine.leopoldo True
raven.clifton True
bardot.mary True
cromwell.gerard True
monroe.david True
west.laura True
langley.lucy True
daughtler.mabel True
stoll.rachelle True
ford.victoria True
DC$ True 12/3/2023 3:29:18 AM
=============================
Local Administrators
=============================
Get-LocalGroupMember : Group Administrators was not found.At line:1 char:1+ Get-LocalGroupMember Administrators | ft Name, PrincipalSource+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : ObjectNotFound: (Administrators:String) [Get-LocalGroupMember], Gro upNotFoundException + FullyQualifiedErrorId : GroupNotFound,Microsoft.PowerShell.Commands.GetLocalGroupMemberComm and
=============================
Local Groups
=============================
Name
----
Cert Publishers
RAS and IAS Servers
Allowed RODC Password Replication Group
Denied RODC Password Replication Group
=============================
Logged in Users
=============================
No session exists for *
=============================
Recent RDP Sessions
=============================
get-winevent : Attempted to perform an unauthorized operation.At line:1 char:1+ get-winevent -logname "Microsoft-Windows-TerminalServices-LocalSessio ...+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : NotSpecified: (:) [Get-WinEvent], UnauthorizedAccessException + FullyQualifiedErrorId : System.UnauthorizedAccessException,Microsoft.PowerShell.Commands.Ge tWinEventCommand
=============================
User Directories
=============================
Name
----
Administrator
ldap
Public
support
=============================
Password policy
=============================
Force user logoff how long after time expires?: Never
Minimum password age (days): 1
Maximum password age (days): Unlimited
Minimum password length: 7
Length of password history maintained: 24
Lockout threshold: Never
Lockout duration (minutes): 30
Lockout observation window (minutes): 30
Computer role: PRIMARY
The command completed successfully.
=============================
Credential Manager
=============================
Currently stored credentials:
* NONE *
=============================
User Autologon Registry Items
=============================
DefaultDomainName DefaultUserName
----------------- ---------------
SUPPORT
=============================
###-----NETWORK-----###
=============================
()-().----. .
\"/ ___ ;________./
^^ ^^
=============================
=============================
Network Information
=============================
New-CimSession : Access denied At C:\Windows\system32\WindowsPowerShell\v1.0\Modules\NetTCPIP\NetIPConfiguration.psm1:46 char:27+ $CimSession = New-CimSession+ ~~~~~~~~~~~~~~ + CategoryInfo : PermissionDenied: (:) [New-CimSession], CimException + FullyQualifiedErrorId : HRESULT 0x80041003,Microsoft.Management.Infrastructure.CimCmdlets.N ewCimSessionCommand Get-CimInstance : Access denied At C:\Windows\system32\WindowsPowerShell\v1.0\Modules\NetTCPIP\NetIPConfiguration.psm1:47 char:30+ ... $ComputerName = (Get-CimInstance win32_ComputerSystem).name+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : PermissionDenied: (root\cimv2:win32_ComputerSystem:String) [Get-Cim Instance], CimException + FullyQualifiedErrorId : HRESULT 0x80041003,Microsoft.Management.Infrastructure.CimCmdlets.G etCimInstanceCommand Get-NetCompartment : Cannot validate argument on parameter 'CimSession'. The argument is null or empty. Provide an argument that is not null or empty, and then try the command again.At C:\Windows\system32\WindowsPowerShell\v1.0\Modules\NetTCPIP\NetIPConfiguration.psm1:72 char:60+ ... $Compartments = Get-NetCompartment -CimSession $CimSession+ ~~~~~~~~~~~ + CategoryInfo : InvalidData: (:) [Get-NetCompartment], ParameterBindingValidationEx ception + FullyQualifiedErrorId : ParameterArgumentValidationError,Get-NetCompartment Get-NetAdapter : Cannot validate argument on parameter 'CimSession'. The argument is null or empty. Provide an argument that is not null or empty, and then try the command again.At C:\Windows\system32\WindowsPowerShell\v1.0\Modules\NetTCPIP\NetIPConfiguration.psm1:90 char:67+ ... $Adapters = Get-NetAdapter -IncludeHidden -CimSession $CimSession+ ~~~~~~~~~~~ + CategoryInfo : InvalidData: (:) [Get-NetAdapter], ParameterBindingValidationExcept ion + FullyQualifiedErrorId : ParameterArgumentValidationError,Get-NetAdapter Get-NetIPInterface : Cannot validate argument on parameter 'CimSession'. The argument is null or empty. Provide an argument that is not null or empty, and then try the command again.At C:\Windows\system32\WindowsPowerShell\v1.0\Modules\NetTCPIP\NetIPConfiguration.psm1:91 char:126+ ... nts:$AllCompartments -PolicyStore ActiveStore -CimSession $CimSession+ ~~~~~~~~~~~ + CategoryInfo : InvalidData: (:) [Get-NetIPInterface], ParameterBindingValidationEx ception + FullyQualifiedErrorId : ParameterArgumentValidationError,Get-NetIPInterface
=============================
DNS Servers
=============================
Get-DnsClientServerAddress : Cannot connect to CIM server. Access denied At line:1 char:1+ Get-DnsClientServerAddress -AddressFamily IPv4 | ft+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : ResourceUnavailable: (MSFT_DNSClientServerAddress:String) [Get-DnsC lientServerAddress], CimJobException + FullyQualifiedErrorId : CimJob_BrokenCimSession,Get-DnsClientServerAddress
=============================
ARP cache
=============================
Get-NetNeighbor : Cannot connect to CIM server. Access denied At line:1 char:1+ Get-NetNeighbor -AddressFamily IPv4 | ft ifIndex,IPAddress,LinkLayerA ...+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : ResourceUnavailable: (MSFT_NetNeighbor:String) [Get-NetNeighbor], C imJobException + FullyQualifiedErrorId : CimJob_BrokenCimSession,Get-NetNeighbor
=============================
Routing Table
=============================
Get-NetRoute : Cannot connect to CIM server. Access denied At line:1 char:1+ Get-NetRoute -AddressFamily IPv4 | ft DestinationPrefix,NextHop,Route ...+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : ResourceUnavailable: (MSFT_NetRoute:String) [Get-NetRoute], CimJobE xception + FullyQualifiedErrorId : CimJob_BrokenCimSession,Get-NetRoute
=============================
Network Connections
=============================
Active Connections
Proto Local Address Foreign Address State PID
TCP 0.0.0.0:88 0.0.0.0:0 LISTENING 644
TCP 0.0.0.0:135 0.0.0.0:0 LISTENING 956
TCP 0.0.0.0:389 0.0.0.0:0 LISTENING 644
TCP 0.0.0.0:445 0.0.0.0:0 LISTENING 4
TCP 0.0.0.0:464 0.0.0.0:0 LISTENING 644
TCP 0.0.0.0:593 0.0.0.0:0 LISTENING 956
TCP 0.0.0.0:636 0.0.0.0:0 LISTENING 644
TCP 0.0.0.0:3268 0.0.0.0:0 LISTENING 644
TCP 0.0.0.0:3269 0.0.0.0:0 LISTENING 644
TCP 0.0.0.0:5985 0.0.0.0:0 LISTENING 4
TCP 0.0.0.0:9389 0.0.0.0:0 LISTENING 1420
TCP 0.0.0.0:47001 0.0.0.0:0 LISTENING 4
TCP 0.0.0.0:49664 0.0.0.0:0 LISTENING 644
TCP 0.0.0.0:49665 0.0.0.0:0 LISTENING 504
TCP 0.0.0.0:49666 0.0.0.0:0 LISTENING 776
TCP 0.0.0.0:49667 0.0.0.0:0 LISTENING 1176
TCP 0.0.0.0:49668 0.0.0.0:0 LISTENING 644
TCP 0.0.0.0:49676 0.0.0.0:0 LISTENING 644
TCP 0.0.0.0:49681 0.0.0.0:0 LISTENING 628
TCP 0.0.0.0:49690 0.0.0.0:0 LISTENING 644
TCP 0.0.0.0:49695 0.0.0.0:0 LISTENING 2064
TCP 0.0.0.0:49707 0.0.0.0:0 LISTENING 2088
TCP 10.129.50.188:53 0.0.0.0:0 LISTENING 2064
TCP 10.129.50.188:139 0.0.0.0:0 LISTENING 4
TCP 10.129.50.188:389 10.129.50.188:49689 ESTABLISHED 644
TCP 10.129.50.188:389 10.129.50.188:49701 ESTABLISHED 644
TCP 10.129.50.188:389 10.129.50.188:49740 ESTABLISHED 644
TCP 10.129.50.188:5985 10.10.14.40:52436 TIME_WAIT 0
TCP 10.129.50.188:5985 10.10.14.40:52444 ESTABLISHED 4
TCP 10.129.50.188:49689 10.129.50.188:389 ESTABLISHED 2088
TCP 10.129.50.188:49701 10.129.50.188:389 ESTABLISHED 2088
TCP 10.129.50.188:49740 10.129.50.188:389 ESTABLISHED 2064
TCP 127.0.0.1:53 0.0.0.0:0 LISTENING 2064
TCP 127.0.0.1:389 127.0.0.1:49678 ESTABLISHED 644
TCP 127.0.0.1:389 127.0.0.1:49680 ESTABLISHED 644
TCP 127.0.0.1:389 127.0.0.1:49683 ESTABLISHED 644
TCP 127.0.0.1:389 127.0.0.1:49694 ESTABLISHED 644
TCP 127.0.0.1:3268 127.0.0.1:49705 ESTABLISHED 644
TCP 127.0.0.1:49678 127.0.0.1:389 ESTABLISHED 2124
TCP 127.0.0.1:49680 127.0.0.1:389 ESTABLISHED 2124
TCP 127.0.0.1:49683 127.0.0.1:389 ESTABLISHED 1420
TCP 127.0.0.1:49694 127.0.0.1:389 ESTABLISHED 2064
TCP 127.0.0.1:49705 127.0.0.1:3268 ESTABLISHED 1420
TCP [::]:88 [::]:0 LISTENING 644
TCP [::]:135 [::]:0 LISTENING 956
TCP [::]:445 [::]:0 LISTENING 4
TCP [::]:464 [::]:0 LISTENING 644
TCP [::]:593 [::]:0 LISTENING 956
TCP [::]:5985 [::]:0 LISTENING 4
TCP [::]:9389 [::]:0 LISTENING 1420
TCP [::]:47001 [::]:0 LISTENING 4
TCP [::]:49664 [::]:0 LISTENING 644
TCP [::]:49665 [::]:0 LISTENING 504
TCP [::]:49666 [::]:0 LISTENING 776
TCP [::]:49667 [::]:0 LISTENING 1176
TCP [::]:49668 [::]:0 LISTENING 644
TCP [::]:49676 [::]:0 LISTENING 644
TCP [::]:49681 [::]:0 LISTENING 628
TCP [::]:49690 [::]:0 LISTENING 644
TCP [::]:49695 [::]:0 LISTENING 2064
TCP [::]:49707 [::]:0 LISTENING 2088
TCP [::1]:53 [::]:0 LISTENING 2064
TCP [::1]:49668 [::1]:49697 ESTABLISHED 644
TCP [::1]:49668 [::1]:58945 ESTABLISHED 644
TCP [::1]:49692 [::1]:49668 TIME_WAIT 0
TCP [::1]:49697 [::1]:49668 ESTABLISHED 2088
TCP [::1]:49733 [::1]:49668 TIME_WAIT 0
TCP [::1]:49741 [::1]:135 TIME_WAIT 0
TCP [::1]:58944 [::1]:135 TIME_WAIT 0
TCP [::1]:58945 [::1]:49668 ESTABLISHED 644
UDP 0.0.0.0:123 *:* 764
UDP 0.0.0.0:389 *:* 644
UDP 0.0.0.0:500 *:* 2100
UDP 0.0.0.0:4500 *:* 2100
UDP 0.0.0.0:5353 *:* 1088
UDP 10.129.50.188:88 *:* 644
UDP 10.129.50.188:137 *:* 4
UDP 10.129.50.188:138 *:* 4
UDP 10.129.50.188:464 *:* 644
UDP 127.0.0.1:53 *:* 2064
UDP 127.0.0.1:51394 127.0.0.1:51394 1680
UDP 127.0.0.1:52347 127.0.0.1:52347 2088
UDP 127.0.0.1:54150 127.0.0.1:54150 1496
UDP 127.0.0.1:56058 127.0.0.1:56058 2124
UDP 127.0.0.1:58563 127.0.0.1:58563 1420
UDP 127.0.0.1:62792 127.0.0.1:62792 2064
UDP 127.0.0.1:65085 127.0.0.1:65085 3780
UDP 127.0.0.1:65086 127.0.0.1:65086 952
UDP [::]:123 *:* 764
UDP [::]:500 *:* 2100
UDP [::]:4500 *:* 2100
UDP [::]:58797 *:* 1088
UDP [::]:64272 *:* 2064
UDP [::1]:53 *:* 2064
UDP [::1]:56059 *:* 2064
=============================
Proxy Settings
=============================
Current WinHTTP proxy settings:
Direct access (no proxy server).
=============================
Connected Drives
=============================
Name Used (GB) Free (GB) Provider Root CurrentLo
cation
---- --------- --------- -------- ---- ---------
C FileSystem C:\ ...uments
=============================
PuTTY sessions
=============================
Get-ChildItem : Cannot find path 'HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\Sessions' because it does not exist.At line:1 char:1+ Get-ChildItem HKCU:\Software\SimonTatham\PuTTY\Sessions+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : ObjectNotFound: (HKEY_CURRENT_US...\PuTTY\Sessions:String) [Get-Chi ldItem], ItemNotFoundException + FullyQualifiedErrorId : PathNotFound,Microsoft.PowerShell.Commands.GetChildItemCommand
=============================
Saved PuTTY SSH Keys
=============================
Get-Childitem : Cannot find path 'HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\SshHostKeys\' because it does not exist.At line:1 char:1+ Get-Childitem HKCU:\Software\SimonTatham\PuTTY\SshHostKeys\+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : ObjectNotFound: (HKEY_CURRENT_US...TY\SshHostKeys\:String) [Get-Chi ldItem], ItemNotFoundException + FullyQualifiedErrorId : PathNotFound,Microsoft.PowerShell.Commands.GetChildItemCommand
=============================
RDP Session log
=============================
Get-EventLog : Requested registry access is not allowed.At line:1 char:1+ Get-EventLog security -after (Get-date -hour 0 -minute 0 -second 0) | ...+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : NotSpecified: (:) [Get-EventLog], SecurityException + FullyQualifiedErrorId : System.Security.SecurityException,Microsoft.PowerShell.Commands.Get EventLogCommand
=============================
###-FIREWALL / AV-###
=============================
()-().----. .
\"/ ___ ;________./
^^ ^^
=============================
=============================
Defender status
=============================
Get-MpComputerStatus : Cannot connect to CIM server. Access denied At line:1 char:1+ Get-MpComputerStatus+ ~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : ResourceUnavailable: (MSFT_MpComputerStatus:String) [Get-MpComputer Status], CimJobException + FullyQualifiedErrorId : CimJob_BrokenCimSession,Get-MpComputerStatus
=============================
App Locker Policies
=============================
=============================
Firewall Config
=============================
Domain profile configuration (current):
-------------------------------------------------------------------
Operational mode = Enable
Exception mode = Enable
Multicast/broadcast response mode = Enable
Notification mode = Disable
Service configuration for Domain profile:
Mode Customized Name
-------------------------------------------------------------------
Enable No File and Printer Sharing
Allowed programs configuration for Domain profile:
Mode Traffic direction Name / Program
-------------------------------------------------------------------
Port configuration for Domain profile:
Port Protocol Mode Traffic direction Name
-------------------------------------------------------------------
Standard profile configuration:
-------------------------------------------------------------------
Operational mode = Enable
Exception mode = Enable
Multicast/broadcast response mode = Enable
Notification mode = Disable
Service configuration for Standard profile:
Mode Customized Name
-------------------------------------------------------------------
Enable No File and Printer Sharing
Allowed programs configuration for Standard profile:
Mode Traffic direction Name / Program
-------------------------------------------------------------------
Port configuration for Standard profile:
Port Protocol Mode Traffic direction Name
-------------------------------------------------------------------
Log configuration:
-------------------------------------------------------------------
File location = C:\Windows\system32\LogFiles\Firewall\pfirewall.log
Max file size = 4096 KB
Dropped packets = Disable
Connections = Disable
IMPORTANT: Command executed successfully.
However, "netsh firewall" is deprecated;
use "netsh advfirewall firewall" instead.
For more information on using "netsh advfirewall firewall" commands
instead of "netsh firewall", see KB article 947709
at https://go.microsoft.com/fwlink/?linkid=121488 .
=============================
###-PROCESS / PROGS-###
=============================
()-().----. .
\"/ ___ ;________./
^^ ^^
=============================
=============================
Running Processes
=============================
gwmi : Access denied At line:1 char:1+ gwmi -Query "Select * from Win32_Process" | where {$_.Name -notlike " ...+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : InvalidOperation: (:) [Get-WmiObject], ManagementException + FullyQualifiedErrorId : GetWMIManagementException,Microsoft.PowerShell.Commands.GetWmiObjec tCommand
=============================
Running Services
=============================
ERROR: Access denied
=============================
Checking registry for AlwaysInstallElevated
=============================
False
=============================
Unquoted Service Paths
=============================
gwmi : Access denied At line:1 char:1+ gwmi -class Win32_Service -Property Name, DisplayName, PathName, Star ...+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : InvalidOperation: (:) [Get-WmiObject], ManagementException + FullyQualifiedErrorId : GetWMIManagementException,Microsoft.PowerShell.Commands.GetWmiObjec tCommand
=============================
Software in Registry
=============================
Name
----
HKEY_LOCAL_MACHINE\SOFTWARE\Classes
HKEY_LOCAL_MACHINE\SOFTWARE\Clients
HKEY_LOCAL_MACHINE\SOFTWARE\DefaultUserEnvironment
HKEY_LOCAL_MACHINE\SOFTWARE\Google
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
HKEY_LOCAL_MACHINE\SOFTWARE\ODBC
HKEY_LOCAL_MACHINE\SOFTWARE\OpenSSH
HKEY_LOCAL_MACHINE\SOFTWARE\Policies
HKEY_LOCAL_MACHINE\SOFTWARE\RegisteredApplications
HKEY_LOCAL_MACHINE\SOFTWARE\Setup
HKEY_LOCAL_MACHINE\SOFTWARE\VMware, Inc.
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node
=============================
Searching for SAM backup files
=============================
False
False
=============================
Installed Software Directories
=============================
Parent Name LastWriteTime
------ ---- -------------
Program Files Common Files 5/19/2022 2:28:33 AM
Program Files Internet Explorer 5/8/2021 1:15:05 AM
Program Files ModifiableWindowsApps 5/8/2021 1:15:05 AM
Program Files VMware 7/21/2022 4:01:48 AM
Program Files Windows Defender 5/20/2022 7:08:35 PM
Program Files Windows Defender Advanced Threat Protection 7/21/2022 6:03:23 AM
Program Files Windows NT 5/8/2021 2:34:54 AM
Program Files WindowsPowerShell 5/8/2021 1:27:30 AM
Program Files (x86) Common Files 5/8/2021 1:27:37 AM
Program Files (x86) Internet Explorer 5/8/2021 1:15:05 AM
Program Files (x86) Microsoft.NET 5/8/2021 1:27:30 AM
Program Files (x86) Windows NT 5/8/2021 2:34:54 AM
Program Files (x86) WindowsPowerShell 5/8/2021 1:15:05 AM
=============================
Folders with Everyone Permissions
=============================
=============================
Folders with BUILTIN\User Permissions
=============================
=============================
Scheduled Tasks
=============================
Get-ScheduledTask : Cannot connect to CIM server. Access denied At line:1 char:1+ Get-ScheduledTask | where {$_.TaskPath -notlike "\Microsoft*"} | ft T ...+ ~~~~~~~~~~~~~~~~~ + CategoryInfo : ResourceUnavailable: (MSFT_ScheduledTask:String) [Get-ScheduledTask ], CimJobException + FullyQualifiedErrorId : CimJob_BrokenCimSession,Get-ScheduledTask
=============================
Tasks Folder
=============================
=============================
Startup Commands
=============================
Get-CimInstance : Access denied At line:1 char:1+ Get-CimInstance Win32_StartupCommand | select Name, command, Location ...+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : PermissionDenied: (root\cimv2:Win32_StartupCommand:String) [Get-Cim Instance], CimException + FullyQualifiedErrorId : HRESULT 0x80041003,Microsoft.Management.Infrastructure.CimCmdlets.G etCimInstanceCommand
=============================
Searching for named pipes
=============================
Directory: \\.\pipe
Mode LastWriteTime Length Name
---- ------------- ------ ----
------ 12/31/1600 4:00 PM 3 InitShutdown
------ 12/31/1600 4:00 PM 7 lsass
------ 12/31/1600 4:00 PM 3 ntsvcs
------ 12/31/1600 4:00 PM 3 scerpc
Directory: \\.\pipe\Winsock2
Mode LastWriteTime Length Name
---- ------------- ------ ----
------ 12/31/1600 4:00 PM 1 Winsock2\CatalogChangeListener-284-0
------ 12/31/1600 4:00 PM 1 Winsock2\CatalogChangeListener-3bc-0
Directory: \\.\pipe
Mode LastWriteTime Length Name
---- ------------- ------ ----
------ 12/31/1600 4:00 PM 3 epmapper
Directory: \\.\pipe\Winsock2
Mode LastWriteTime Length Name
---- ------------- ------ ----
------ 12/31/1600 4:00 PM 1 Winsock2\CatalogChangeListener-1f8-0
Directory: \\.\pipe
Mode LastWriteTime Length Name
---- ------------- ------ ----
------ 12/31/1600 4:00 PM 3 LSM_API_service
Directory: \\.\pipe\Winsock2
Mode LastWriteTime Length Name
---- ------------- ------ ----
------ 12/31/1600 4:00 PM 1 Winsock2\CatalogChangeListener-3f4-0
Directory: \\.\pipe
Mode LastWriteTime Length Name
---- ------------- ------ ----
------ 12/31/1600 4:00 PM 3 eventlog
Directory: \\.\pipe\Winsock2
Mode LastWriteTime Length Name
---- ------------- ------ ----
------ 12/31/1600 4:00 PM 1 Winsock2\CatalogChangeListener-308-0
Directory: \\.\pipe
Mode LastWriteTime Length Name
---- ------------- ------ ----
------ 12/31/1600 4:00 PM 4 wkssvc
------ 12/31/1600 4:00 PM 3 atsvc
Directory: \\.\pipe\Winsock2
Mode LastWriteTime Length Name
---- ------------- ------ ----
------ 12/31/1600 4:00 PM 1 Winsock2\CatalogChangeListener-498-0
------ 12/31/1600 4:00 PM 1 Winsock2\CatalogChangeListener-284-1
Directory: \\.\pipe\RpcProxy
Mode LastWriteTime Length Name
---- ------------- ------ ----
------ 12/31/1600 4:00 PM 3 RpcProxy\49676
Directory: \\.\pipe
Mode LastWriteTime Length Name
---- ------------- ------ ----
------ 12/31/1600 4:00 PM 3 91eacadf25f90510
Directory: \\.\pipe\RpcProxy
Mode LastWriteTime Length Name
---- ------------- ------ ----
------ 12/31/1600 4:00 PM 3 RpcProxy\593
Directory: \\.\pipe
Mode LastWriteTime Length Name
---- ------------- ------ ----
------ 12/31/1600 4:00 PM 4 srvsvc
------ 12/31/1600 4:00 PM 3 winreg
------ 12/31/1600 4:00 PM 3 efsrpc
------ 12/31/1600 4:00 PM 3 netdfs
------ 12/31/1600 4:00 PM 1 vgauth-service
Directory: \\.\pipe\Winsock2
Mode LastWriteTime Length Name
---- ------------- ------ ----
------ 12/31/1600 4:00 PM 1 Winsock2\CatalogChangeListener-274-0
Directory: \\.\pipe
Mode LastWriteTime Length Name
---- ------------- ------ ----
------ 12/31/1600 4:00 PM 3 W32TIME_ALT
Directory: \\.\pipe\Winsock2
Mode LastWriteTime Length Name
---- ------------- ------ ----
------ 12/31/1600 4:00 PM 1 Winsock2\CatalogChangeListener-810-0
Directory: \\.\pipe\PIPE_EVENTROOT
Mode LastWriteTime Length Name
---- ------------- ------ ----
------ 12/31/1600 4:00 PM 1 PIPE_EVENTROOT\CIMV2SCM EVENT PROVIDER
Directory: \\.\pipe\Winsock2
Mode LastWriteTime Length Name
---- ------------- ------ ----
------ 12/31/1600 4:00 PM 1 Winsock2\CatalogChangeListener-828-0
Directory: \\.\pipe
Mode LastWriteTime Length Name
---- ------------- ------ ----
------ 12/31/1600 4:00 PM 1 PSHost.133460764276545794.3780.DefaultAppDomain.
powershell
------ 12/31/1600 4:00 PM 1 PSHost.133460765843678338.3744.DefaultAppDomain.
wsmprovhost
------ 12/31/1600 4:00 PM 1 PSHost.133460766279800367.1812.DefaultAppDomain.
powershell
=============================
Searching for Unattend and Sysprep files
=============================
Directory: C:\Windows\System32
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:11 AM 614 WdsUnattendTemplate.xml
Directory: C:\Windows\WinSxS\amd64_microsoft-windows-d..t-services-unattend_31bf3856ad364e35_1
0.0.20348.1_none_528a574a6dbe9437
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:11 AM 614 WdsUnattendTemplate.xml
=============================
Searching for web.config files
=============================
Directory: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:14 AM 1040 web.config
Directory: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Config
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:14 AM 43133 web.config
Directory: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:14 AM 1040 web.config
Directory: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Config
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:14 AM 43133 web.config
Directory: C:\Windows\WinSxS\amd64_microsoft-windows-d..cehealthattestation_31bf3856ad364e35_1
0.0.20348.1_none_0c2e78cd71412811
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:18 AM 2042 web.config
Directory: C:\Windows\WinSxS\amd64_microsoft-windows-r..-licensing-external_31bf3856ad364e35_1
0.0.20348.1_none_ad2db43ebff2b793
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:21 AM 1426 web.config
Directory: C:\Windows\WinSxS\amd64_microsoft-windows-r..-web-administration_31bf3856ad364e35_1
0.0.20348.1_none_4227238622f5bec1
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:12 AM 1332 web.config
Directory: C:\Windows\WinSxS\amd64_microsoft-windows-r..-web-groupexpansion_31bf3856ad364e35_1
0.0.20348.1_none_519724206a6d1721
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:12 AM 1501 web.config
Directory: C:\Windows\WinSxS\amd64_microsoft-windows-r..certification-reach_31bf3856ad364e35_1
0.0.20348.1_none_1410befbadd63a71
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:12 AM 3532 web.config
Directory: C:\Windows\WinSxS\amd64_microsoft-windows-r..es-web-decommission_31bf3856ad364e35_1
0.0.20348.1_none_616d85097c9f9bd7
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:12 AM 1531 web.config
Directory: C:\Windows\WinSxS\amd64_microsoft-windows-r..s-web-certification_31bf3856ad364e35_1
0.0.20348.1_none_6046c0d6a9f0fc73
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:12 AM 1501 web.config
Directory: C:\Windows\WinSxS\amd64_microsoft-windows-r..tification-external_31bf3856ad364e35_1
0.0.20348.1_none_024d4594c3a6fba9
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:21 AM 1400 web.config
Directory: C:\Windows\WinSxS\amd64_microsoft-windows-r..vices-web-licensing_31bf3856ad364e35_1
0.0.20348.1_none_c1d8336d4539121f
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:12 AM 1603 web.config
Directory: C:\Windows\WinSxS\amd64_microsoft-windows-r..web-licensing-reach_31bf3856ad364e35_1
0.0.20348.1_none_365dce5470382cbb
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:21 AM 1668 web.config
Directory: C:\Windows\WinSxS\amd64_microsoft.windows.r..ation.server.nongac_31bf3856ad364e35_1
0.0.20348.1_none_3a8a1b05aed34584
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:12 AM 2173 Web.config
Directory: C:\Windows\WinSxS\amd64_netfx4-aspnet_webadmin_b03f5f7f11d50a3a_4.0.15806.0_none_a7
c19c2403ed1c0f
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:12 AM 1040 web.config
Directory:
C:\Windows\WinSxS\amd64_netfx4-web_config_b03f5f7f11d50a3a_4.0.15806.0_none_cc8d87808387fbf1
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:25 AM 5706 web.config
Directory: C:\Windows\WinSxS\amd64_updateservices-webservices-apiremoting_31bf3856ad364e35_10.
0.20348.1_none_6982510e0716dd4e
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:23 AM 2142 Web.config
Directory: C:\Windows\WinSxS\amd64_updateservices-webservices-client_31bf3856ad364e35_10.0.203
48.1_none_87512a1fc4a5794a
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:23 AM 2620 Web.config
Directory: C:\Windows\WinSxS\amd64_updateservices-webservices-dssauth_31bf3856ad364e35_10.0.20
348.1_none_a303681c72c0f589
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:23 AM 2342 Web.config
Directory: C:\Windows\WinSxS\amd64_updateservices-webservices-reporting_31bf3856ad364e35_10.0.
20348.1_none_a5022b14c19e28c3
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:23 AM 2146 Web.config
Directory: C:\Windows\WinSxS\amd64_updateservices-webservices-serversync_31bf3856ad364e35_10.0
.20348.1_none_ed1a05375e9fbaf9
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:12 AM 3726 Web.config
Directory: C:\Windows\WinSxS\amd64_updateservices-webservices-simpleauth_31bf3856ad364e35_10.0
.20348.1_none_c4ad25d5ce31b1a3
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:23 AM 2106 Web.config
Directory: C:\Windows\WinSxS\msil_microsoft-windows-p..ccess-web.resources_31bf3856ad364e35_10
.0.20348.1_en-us_c39ff644419377e9
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 2:33 AM 1262 Web.config
Directory: C:\Windows\WinSxS\msil_microsoft-windows-p..rshellwebaccess-web_31bf3856ad364e35_10
.0.20348.1_none_f00fde4e746775de
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:12 AM 2808 Web.config
Directory: C:\Windows\WinSxS\x86_netfx4-aspnet_webadmin_b03f5f7f11d50a3a_4.0.15806.0_none_ef6e
d2fb18694515
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:12 AM 1040 web.config
Directory:
C:\Windows\WinSxS\x86_netfx4-web_config_b03f5f7f11d50a3a_4.0.15806.0_none_143abe57980424f7
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/8/2021 1:25 AM 5706 web.config
=============================
Searching for other interesting files
=============================
Directory: C:\Windows\Help\en-US
<SNIP>