πŸ“ŠInitial Enumeration

🎯 Overview

Initial enumeration is crucial for identifying privilege escalation paths. After gaining low-privileged access, we must systematically gather information about the system, users, services, and configurations to find attack vectors.

πŸ–₯️ System Information

Process Enumeration

# Running processes with services
tasklist /svc

# Key processes to identify:
- System processes (smss.exe, csrss.exe, winlogon.exe, lsass.exe)
- Non-standard processes (FileZilla, custom services)
- Security tools (MsMpEng.exe = Windows Defender)

Environment Variables

# Display all environment variables
set

# Key variables to examine:
PATH       # Custom paths, DLL hijacking opportunities
HOMEDRIVE  # Network drives, file shares
USERPROFILE # User directory access
TEMP       # Temporary directories

Critical PATH Analysis:

  • Custom applications in PATH (Python, Java)

  • Writable directories in PATH (DLL injection)

  • Order matters: left-to-right execution priority

Detailed System Information

πŸ”„ Patches and Updates

Hotfix Enumeration

πŸ“¦ Installed Programs

Software Discovery

Target Applications:

  • FileZilla/Putty - Credential storage (LaZagne)

  • Java/Python - Version vulnerabilities

  • Custom applications - Privilege escalation vectors

  • Development tools - Source code access

🌐 Network Services

Active Connections

πŸ‘₯ User & Group Enumeration

Current User Context

Key Privileges to Look For:

  • SeImpersonatePrivilege - Juicy Potato attacks

  • SeAssignPrimaryTokenPrivilege - Token manipulation

  • SeTakeOwnershipPrivilege - File ownership changes

  • SeBackupPrivilege - File access bypass

User Discovery

Group Analysis

High-Value Groups:

  • Administrators - Local admin access

  • Backup Operators - File access, backup rights

  • Server Operators - Service control

  • Account Operators - User/group management

  • Print Operators - Load driver privilege

Session Information

Account Policies

🎯 HTB Academy Lab Solutions

Lab Environment

  • Target: 10.129.43.43 (ACADEMY-WINLPE-SRV01)

  • Credentials: htb-student:HTB_@cademy_stdnt!

Question 1: Non-default User Privileges

Command:

Answer: SeTakeOwnershipPrivilege

Question 2: Backup Operators Group Member

Command:

Answer: sarah

Question 3: Service on Port 8080

Commands:

Answer: tomcat8

Question 4: Logged-in User

Command:

Answer: sccm_svc

Question 5: Session Type

Command:

Answer: console

πŸ“‹ Essential Enumeration Checklist

System Context

User Context

⚑ Quick Reference Commands

πŸ’‘ Key Takeaways

  1. Systematic approach - Don't skip basic enumeration steps

  2. Privilege identification - Special privileges = escalation paths

  3. Service analysis - Non-standard services often vulnerable

  4. Group membership - Powerful groups provide direct escalation

  5. Environment awareness - PATH, shares, and custom configurations matter

  6. Session monitoring - Other logged-in users = additional targets


This enumeration phase sets the foundation for successful privilege escalation by providing comprehensive system and user context.

Last updated