Windows Basics
Commands and programs that all Windows users need to know (but many don't!).
Last updated
Commands and programs that all Windows users need to know (but many don't!).
Last updated
If you don't know about Mark Russinovich's amazing tools then go and check them out. Many, many use cases for a lot of these tools, from enumeration, persistence, threat-hunting, to ordinary system administration.
TODO: Add more information about Microsoft Sysinternals (issue #23)
Read about each tool and find the ones that work for Red Teaming
Add highlights about best tools...psexec, accesschk, etc.
Add examples of how to use each in a command-line only environment
Link to relevant sections (privilege escalation, enumeration, etc.)
Sysinternals tools can be linked to directly and run in-memory from https://live.sysinternals.com/
Program name | Description |
---|---|
Set a file as Hidden
. This can also be used to change other file property flags such as Archive
and ReadOnly
.
https://ss64.com/nt/icacls.html Interesting permissions
D - Delete access
F - Full access (Edit_Permissions+Create+Delete+Read+Write)
N - No access
M - Modify access (Create+Delete+Read+Write)
RX - Read and eXecute access
R - Read-only access
W - Write-only access
Set the $InheritSettings
to None
if targeting a file instead of a folder.
A great example is to mount the Sysinternals Live drive to use the tools directly from Microsoft:
You can thank me later.
The command set
will display all current environment variables and their values in cmd.exe. In PowerShell use Get-ChildItem env:
(or one of its aliases!) to list environment variables.
Many of the environment variables in the cmd.exe column can be used in other places inside Windows as well, such as the Address Bar of a browser or Explorer window.
You can find more about Windows environment variables on the PowerShell page.
Below is a comparison between the environment variables used in PowerShell versus those used in the classic cmd.exe environment (which are also used in many other places throughout Windows, such as Task Scheduler, Event logs, and more).
(TODO: Make tables)
CTRL+N (open new session), CTRL+R (Execute Commands), CTRL+SHIFT+ESC (Task Manager), Windows+E (open explorer), CTRL-B, CTRL-I (Favourites), CTRL-H (History), CTRL-L, CTRL-O (File/Open Dialog), CTRL-P (Print Dialog), CTRL-S (Save As)
Hidden Administrative menu: CTRL-ALT-F8, CTRL-ESC-F9
shell:Administrative Tools
shell:DocumentsLibrary
shell:Libraries
shell:UserProfiles
shell:Personal
shell:SearchHomeFolder
shell:NetworkPlacesFolder
shell:SendTo
shell:UserProfiles
shell:Common Administrative Tools
shell:MyComputerFolder
shell:InternetFolder
Shell:Profile
Shell:ProgramFiles
Shell:System
Shell:ControlPanelFolder
Shell:Windows
shell:::{21EC2020-3AEA-1069-A2DD-08002B30309D}
--> Control Panel
shell:::{20D04FE0-3AEA-1069-A2D8-08002B30309D}
--> This PC/My Computer
shell:::{208D2C60-3AEA-1069-A2D7-08002B30309D}
--> Network Places
PowerShell is a large and important enough topic that it has its own page.
If you like this content and would like to see more, please consider buying me a coffee!
Setting | Description |
---|---|
Setting | Description |
---|---|
Setting | Description |
---|---|
Meaning | PowerShell | cmd.exe |
---|---|---|
assoc
View all the file associations your computer knows
You can set an association by typing assoc .doc=Word.Document.8
attrib
Change file attributes.
Example: ATTRIB +R +H C:\temp\file.txt
sets file.txt as a hidden, read-only file.
There is no response when it’s successful, so, unless you see an error message the command should have worked.
bitsadmin
Initiate upload or download jobs over the network or internet and monitor the current state of those file transfers
chkdsk
Check the integrity of an entire drive.
This command checks for file fragmentation errors, disk errors, and bad sectors. It will attempt to fix any disk errors. When the command is finished, you’ll see the status of the scan and what actions were taken.
CHKDSK /f C:
Check the C: drive and repair any problems (run as administrator) .
color
Change the background color of the command prompt window
fc
Performs either an ascii or a binary file comparison and lists all of the differences that it finds.
fc /a <file1.txt> <file2.txt>
compare the contents of two ASCII text files.
fc /b <pic1.jpg> <pic2.jpg>
will do a binary comparison of two images.
findstr
Search for strings inside of text files
Supports multiple search strings
Can take as input a file containing file names or directories to search
Supports regular expressions
grep
for Windows, essentially
ipconfig /all
Get detailed information about your current network adapters. Includes: IP address, Subnet mask, Default gateway IP, Domain name
net (issue #24)
The net commands are a suite of command-line utilities in Windows that allow you to manage various aspects of a network and its settings. Below are brief descriptions of some of the net commands along with examples and common use cases
net user
This command is used to manage user accounts on a computer. You can add, remove, and modify user accounts.
Example: net user John /add
adds a new user named John.
Common options: /delete
to remove a user, /domain
to execute the command on a domain controller.
net localgroup
This command manages local groups on the computer. You can add, remove, and list members of a local group.
Example: net localgroup Administrators John /add
adds John to the Administrators group.
Common options: /delete
to remove a group, /add
to add a new group.
net share
This command is used to create, delete, and manage shared resources on the network.
Example: net share myshare=C:\MyFolder /grant:John,full
creates a share named myshare with full access for John.
Common options: /delete
to stop sharing a resource, /grant
to grant access permissions.
net start/stop
These commands are used to start and stop network services.
Example: net start "Web Client"
starts the Web Client service.
Common options: Service names to specify which service to start or stop.
net session
This command displays all current sessions (with no options) or disconnects sessions between the computer and others on the network.
Example: net session \\RemotePC /delete
disconnects the session with the computer named RemotePC.
Common options: /delete
to end a session.
net use
This command connects, disconnects, and displays information about shared network resources.
Example: net use Z: \\Server\Share
maps the network share at \Server\Share to the Z: drive.
Common options: /delete
to disconnect a network drive, /persistent
to make the connection persistent across reboots.
net view
This command displays a list of computers or network resources.
Example: net view \\Server
shows shared resources on the server named Server.
Common options: /domain
to list domains or computers in a domain.
net accounts
This command configures password and logon requirements for users.
Example: net accounts /maxpwage:30
sets the maximum password age to 30 days.
Common options: /forcelogoff
, /minpwlen
, /maxpwage
to set various account policies.
net statistics
This command displays the statistics log for the server or workstation service.
Example: net statistics workstation
shows statistics for the workstation service.
Common options: server to view server service statistics.
net config
This command displays the configuration of the server or workstation service.
Example: net config server
shows the configuration of the server service.
Common options: workstation to view workstation service configuration.
netstat
Provides an overview of network activities and displays which ports are open or have established connections (default display active TCP connections). Common arguments:
-a
: Displays all active TCP connections and the listening TCP and UDP ports.
-b
: Displays the executable involved in creating each connection or listening port.
-e
: Displays Ethernet statistics, such as the number of bytes and packets sent and received.
-n
: Host addresses and port numbers are expressed numerically with no name resolution.
-o
: Displays the process identifier (PID) associated with each connection.
-p <Protocol>
: Shows connections for the protocol specified by Protocol
from tcp
, udp
, tcpv6
, or udpv6
.
-r
: Displays the IP routing table.
-s
: Displays statistics by protocol.
<interval>
: Redisplays the selected information every interval
seconds. Press CTRL+C
to stop.
ping
Test network connectivity.
Test whether your computer can access another computer, a server, or even a website.
Also provides the transit time for the packets in milliseconds.
powercfg
Configure power options
to get a full power efficiency report powercfg – energy
prompt
Change the command prompt from C:>
to something else
regedit
Edit keys in the Windows registry
robocopy
A powerful file copy utility
schtasks
Schedule tasks (similar to Unix cron).
Example: SCHTASKS /Create /SC HOURLY /MO 12 /TR <task_name> /TN c:\temp\script.bat
/sc
accepts arguments like minute, hourly, daily, and monthly
/mo
specifies the frequency
/tr
name of the task
TODO: add more
If you typed the command correctly, you’ll see the response: SUCCESS: The scheduled task “<task_name>” has successfully been created
Running this command with no parameters with display all currently scheduled tasks
sfc
To check the integrity of protected system files (run cmd.exe as administrator first).
/scannow
will check the integrity of all protected system files. If a problem is found, the files will be repaired with backed-up system files.
/VERIFYONLY
: Check the integrity but don’t repair the files.
/SCANFILE
: Scan the integrity of specific files and fix if corrupted.
/VERIFYFILE
: Verify the integrity of specific files but don’t repair them.
/OFFBOOTDIR
: Use this to do repairs on an offline boot directory.
/OFFWINDIR
: Use this to do repairs on an offline Windows directory.
/OFFLOGFILE
: Specify a path to save a log file with scan results. (This scan can take up to 10 or 15 minutes).
shutdown
Shut down or restart the computer from the command line
shutdown /i
will initiate a shutdown, but it will open a GUI window to give the user an option whether to restart or do a full shutdown.
If you don’t want to have a GUI window, you can use shutdown /s
.
There is a long list of other parameters you can use such as log off, hibernate, restart, and more. Just type shutdown
without any arguments to see them all.
systeminfo
Get an overview of important system information
Good for finding out processor details, the exact version of your Windows OS, installed updates, and more
title
Change the title of the command prompt window.
tracert
Trace route to remote host.
Provides you with all of the following information:
Number of hops (intermediate servers) before getting to the destination;
Time it takes to get to each hop;
The IP and sometimes the hostname of each hop
AppendData
Specifies the right to append data to the end of a file.
ChangePermissions
Specifies the right to change the security and audit rules associated with a file or folder.
CreateDirectories
Specifies the right to create a folder.
CreateFiles
Specifies the right to create a file.
Delete
Specifies the right to delete a folder or file.
DeleteSubdirectoriesAndFiles
Specifies the right to delete a folder and any files contained within that folder.
ExecuteFile
Specifies the right to run an application file.
FullControl
Specifies the right to exert full control over a folder or file, and to modify access control and audit rules. This value represents the right to do anything with a file and is the combination of all rights in this enumeration.
ListDirectory
Specifies the right to read the contents of a directory.
Modify
Specifies the right to read, write, list folder contents, delete folders and files, and run application files. This right includes the ReadAndExecute right, the Write right, and the Delete right.
Read
Specifies the right to open and copy folders or files as read-only. This right includes the ReadData right, ReadExtendedAttributes right, ReadAttributes right, and ReadPermissions right.
ReadAndExecute
Specifies the right to open and copy folders or files as read-only, and to run application files. This right includes the Read right and the ExecuteFile right.
ReadAttributes
Specifies the right to open and copy file system attributes from a folder or file. For example, this value specifies the right to view the file creation or modified date. This does not include the right to read data, extended file system attributes, or access and audit rules.
ReadData
Specifies the right to open and copy a file or folder. This does not include the right to read file system attributes, extended file system attributes, or access and audit rules.
ReadExtendedAttributes
Specifies the right to open and copy extended file system attributes from a folder or file. For example, this value specifies the right to view author and content information. This does not include the right to read data, file system attributes, or access and audit rules.
ReadPermissions
Specifies the right to open and copy access and audit rules from a folder or file. This does not include the right to read data, file system attributes, and extended file system attributes.
Synchronize
Specifies whether the application can wait for a file handle to synchronize with the completion of an I/O operation.
TakeOwnership
Specifies the right to change the owner of a folder or file. Note that owners of a resource have full access to that resource.
Traverse
Specifies the right to list the contents of a folder and to run applications contained within that folder.
Write
Specifies the right to create folders and files, and to add or remove data from files. This right includes the WriteData right, AppendData right, WriteExtendedAttributes right, and WriteAttributes right.
WriteAttributes
Specifies the right to open and write file system attributes to a folder or file. This does not include the ability to write data, extended attributes, or access and audit rules.
WriteData
Specifies the right to open and write to a file or folder. This does not include the right to open and write file system attributes, extended file system attributes, or access and audit rules.
WriteExtendedAttributes
Specifies the right to open and write extended file system attributes to a folder or file. This does not include the ability to write data, attributes, or access and audit rules.
ContainerInherit
The ACE is inherited by child container objects.
None
The ACE is not inherited by child objects.
ObjectInherit
The ACE is inherited by child leaf objects.
InheritOnly
Specifies that the ACE is propagated only to child objects. This includes both container and leaf child objects.
None
Specifies that no inheritance flags are set.
NoPropagateInherit
Specifies that the ACE is not propagated to child objects.
C:\ProgramData
$env:ALLUSERSPROFILE
%ALLUSERSPROFILE%
Current User's AppData\Roaming Folder
$env:APPDATA
%APPDATA%
C:\Program Files\Common Files
$env:CommonProgramFiles
%CommonProgramFiles%
C:\Program Files (x86)\Common Files
$env:CommonProgramFiles(x86)
%CommonProgramFiles(x86)%
C:\Program Files\Common Files
$env:CommonProgramW6432
%CommonProgramW6432%
Computer Name
$env:COMPUTERNAME
%COMPUTERNAME%
C:\WINDOWS\system32\cmd.exe
$env:ComSpec
%ComSpec%
C:\Windows\System32\Drivers\DriverData
$env:DriverData
%DriverData%
C:
$env:HOMEDRIVE
%HOMEDRIVE%
Current User's home folder
$env:HOMEPATH
%HOMEPATH%
Current User's AppData\Local folder
$env:LOCALAPPDATA
%LOCALAPPDATA%
UNC Path of Logon Server
$env:LOGONSERVER
%LOGONSERVER%
Number of Processor (cores)
$env:NUMBER_OF_PROCESSORS
%NUMBER_OF_PROCESSORS%
Current User's Onedrive folder
$env:OneDrive
%OneDrive%
Current User's Onedrive folder
$env:OneDriveConsumer
%OneDriveConsumer%
Operating System Family
$env:OS
%OS%
PATH to search when unspecified
$env:Path
%Path%
File Extensions that Windows will search PATH for
$env:PATHEXT
%PATHEXT%
Processor Architecture
$env:PROCESSOR_ARCHITECTURE
%PROCESSOR_ARCHITECTURE%
Processor ID
$env:PROCESSOR_IDENTIFIER
%PROCESSOR_IDENTIFIER%
Processor Level
$env:PROCESSOR_LEVEL
%PROCESSOR_LEVEL%
Processor Revision
$env:PROCESSOR_REVISION
%PROCESSOR_REVISION%
C:\ProgramData
$env:ProgramData
%ProgramData%
C:\Program Files
$env:ProgramFiles
%ProgramFiles%
C:\Program Files (x86)
$env:ProgramFiles(x86)
%ProgramFiles(x86)%
C:\Program Files
$env:ProgramW6432
%ProgramW6432%
PATH for PowerShell Modules
$env:PSModulePath
%PSModulePath%
C:\Users\Public
$env:PUBLIC
%PUBLIC%
Console
$env:SESSIONNAME
%SESSIONNAME%
C:
$env:SystemDrive
%SystemDrive%
C:\WINDOWS
$env:SystemRoot
%SystemRoot%
Current User's AppData\Local\Temp Folder
$env:TEMP
%TEMP%
Current User's AppData\Local\Temp Folder
$env:TMP
%TMP%
Domain Name
$env:USERDOMAIN
%USERDOMAIN%
Roaming Profile Domain
$env:USERDOMAIN_ROAMINGPROFILE
%USERDOMAIN_ROAMINGPROFILE%
User Name
$env:USERNAME
%USERNAME%
User Home Folder
$env:USERPROFILE
%USERPROFILE%
C:\WINDOWS
$env:windir
%windir%