Investigating Windows
A windows machine has been hacked, its your job to go investigate this windows machine and find clues to what the hacker might have done.
This is a challenge that is exactly what is says on the tin, there are a few challenges around investigating a windows machine that has been previously compromised.
Connect to the machine using RDP. The credentials the machine are as follows:
Username: Administrator
Password: letmein123!
No Hints.
Connect
We can deploy the machine on tryhackme page or connect via RDP
Connect using xfreerdp12
xfreerdp /u:Administrator /p:letmein123! /v:10.10.164.154
Open powershell

What's the version and year of the Windows machine?
Execute the command to get system information
systeminfo

Which user logged in last?
Execute the command to check the logon users
query user

When did John log onto the system last?
Use the command
net user john

What IP does the system connect to when it first starts?
When the system starts the IP is showed

What two accounts had administrative privileges (other than the Administrator user)?
Show users from the administrator group, that user have administrator privileges.

What's the name of the scheduled task that is malicious.
List schedule tasks
schtasks /query /fo /LIST

Tog get more info of each of them execute
schtasks /query /tn "TASK_NAME_HERE" /fo LIST /v
You'll notice that one of them is triyng to execute an ps1 file.
What file was the task trying to run daily?
Is one of all interesting tasks Check all of them getting more info with
schtasks /query /tn "Clean file system" /fo LIST /v

What port did this file listen locally for?
schtasks /query /tn "Clean file system" /fo LIST /v

When did Jenny last logon?
net user Jenny

At what date did the compromise take place?
schtasks /query /tn "Clean file system" /fo LIST /v

During the compromise, at what time did Windows first assign special privileges to a new logon?
Open the Event Viewer
Select Security

What tool was used to get Windows passwords?
Check the file

What was the attackers external control and command servers IP?
The machine is connecting to external so let's check the Windows Host File Location
type C:\\Windows\\System32\\drivers\\etc\\hosts

What was the extension name of the shell uploaded via the servers website?

What was the last port the attacker opened?
Check the firewall config, inbound rules and check the port


Check for DNS poisoning, what site was targeted?
type C:\\Windows\\System32\\drivers\\etc\\hosts
