1.Situational-awareness
Windows Network Information
Windows Protections Enumeration
General Enumeration
Key Concepts:
Situational Awareness: Understanding your environment to make informed decisions.
Enumeration: Gathering information about the target system.
Lateral Movement: Moving from one compromised system to another.
Dual-Homed Hosts: Systems with multiple network interfaces.
EDR/Antivirus: Endpoint Detection and Response and Antivirus software.
Application Whitelisting: Controlling which applications can run.
Importance of Situational Awareness:
Effective planning and execution of attacks.
Identifying additional attack vectors.
Avoiding detection by security systems.
Efficient use of time and resources.
Enumeration Techniques:
Network Information:
ipconfig /all
(Windows): Displays network interface configurations.arp -a
(Windows): Displays the ARP cache.route print
(Windows): Displays the routing table.Purpose: Identifies network interfaces, IP addresses, DNS servers, routing paths, and other connected devices.
Importance: Reveals potential lateral movement opportunities and network architecture.
Enumerating Protections:
Get-MpComputerStatus
(PowerShell): Checks Windows Defender status.Get-AppLockerPolicy
(PowerShell): Enumerates AppLocker policies.Test-AppLockerPolicy
(PowerShell): Tests AppLocker policies.Purpose: Identifies antivirus, EDR, and application whitelisting solutions.
Importance: Helps determine which tools and techniques are likely to be detected or blocked.
Key Enhancements and Considerations:
Linux Equivalents:
Mention Linux commands like
ifconfig
,ip addr
,arp
, androute -n
for network information.Mention linux tools like
lynis
andchkrootkit
for enumeration of protections.
EDR Evasion:
Discuss basic EDR evasion techniques, such as modifying payloads and using obfuscation.
Emphasize that EDR evasion is a constant cat and mouse game.
Active Directory Enumeration:
If the target is part of an Active Directory domain, emphasize the importance of enumerating domain controllers and other domain resources.
Tools like
PowerView
can be used.
Process Enumeration:
Tasklist (windows) and ps (linux) are also very important to enumerate running processes.
File System Enumeration:
Enumerating the file system to find sensitive information or misconfigurations is also very important.
Log Analysis:
Mention the importance of checking system logs for suspicious activity.
Real-World Considerations:
Stress the importance of adapting enumeration techniques to the specific environment.
Emphasize the need for thorough testing in a lab environment before using advanced techniques on a client system.
Documentation:
Stress the importance of documenting all findings during the enumeration process.
Threat Intelligence:
Using public threat intelligence can help to understand the most common attacks against the target operating system.
Last updated