Host Enumeration
Processes
Enumerating processes can shed light to any security solutions or programs that are running on the infected host. This may open the door to possible misconfigurations in software we can exploit.
ps
command
ps
commandSeatbelt
Seatbelt is a tool written in C# that enumerates the host for us. It checks for security solutions, OS info, AppLocker, LAPS, event logging, firewall rules, and more.
The execute-assembly
command will run a local .NET executable as a Beacon post-exploitation job. You may pass arguments to this assembly as if it were run from a Windows command-line interface. This command will also inherit your current token.
Keylogger
Keyloggers are especially useful for capturing passwords, usernames, and other sensitive information.
Kill Keylogger Job
Clipboard
Like Keyloggers, capturing the victims clipboard can reward us with credentials that are copy / pasted. A CS Beacon's clipboard command does not start a job like keylogger, it just dumps the current clipboard.
User Sessions
Enumerating currently logged in users on the machine may present us with a good attack path. If there is a user with higher privilege than our current user, we can compromise them and attempt to move laterally.
Screenshots
Taking screenshots of the users desktop can be useful to see what the user is doing. Be careful with this as it may tip off security solutions as it is considerably louder than other enumeration techniques.
Last updated