Enumeration
User Enumeration
Get user information
$tableLayout = @{Expression={((New-Object System.Security.Principal.SecurityIdentifier($_.Value)).Translate([System.Security.Principal.NTAccount])).Value};Label=”Group Name”},
@{Expression={$_.Value};Label=”Group SID”},
@{Expression={$_.Type};Label=”Group Type”}
([Security.Principal.WindowsIdentity]::GetCurrent()).Claims | Format-Table $tableLayout -AutoSizeGet-ChildItem 'HKLM:\Software\Microsoft\Windows NT\CurrentVersion\ProfileList' | ForEach-Object { $_.GetValue('ProfileImagePath') }Get-CimInstance -ComputerName $env:computername -Class Win32_UserAccount -Filter "LocalAccount=True" | Select PSComputername, Name, Status, Disabled, AccountType, Lockout, PasswordRequired, PasswordChangeable | Out-GridView
#Get Current or last logged in username
$CurrentUser = Get-CimInstance -ComputerName $Computer -Class Win32_ComputerSystem | Select-Object -ExpandProperty UserNameGet list of users
Check for AutoLogon accounts
Active Directory
Using WMI Query Language (WQL)
LAPS
Find Administrator Accounts
Search for passwords
Search for keyword in registry
Search in Credential Manager
Check SAM and SYSTEM registry hives
ntdsutil
vssown.vbs
File Permissions
Using accesschk.exe (SysInternals)
OS Information
Get OS Version information
Get basic Windows information
Get installed patches
Drivers
Get a list of installed drivers
Default log path
Make back up of all installed drivers
List Environment Variables
Check Audit (logging) Settings
Windows Event Forwarding
Antivirus
Windows Firewall
Clipboard
Software, Services, and Processes
Software
List the installed software
Uninstall Software
Services
Get detailed information for a specific service
Enable a disabled service
Unquoted service paths
Get running processes
Get permissions of running process binaries
Get current network connections
PowerShell netstat implementation
Startup/AutoRuns
SysInternals AutoRuns
SMB/Samba
SMB Enumeration Checklist
List share drives
Find all connected drives
Check for SMB vulnerabilities:
SMB nmap scripts to enumerate shares and OS discovery
Connect using Username
Connect to Shares
Enumerate SMB shares
Get machine name and then enumerate with smbclient
rpcclient
Connect with a null session
Common Checks
scan for vulnerabilities with nmap
Use TCPdump/Wireshark to get version
SNMP
MIB Tree (Management Information Base)
Scanning for SNMP
Windows CLI gems. Tweets of @wincmdfu
Get entries from IPv4 neighbor cache
Get available wireless networks via cmd and netsh
Quick list IP addresses only
List ALL services AND their binaries
Export SAM from the Windows Registry to a file
Enable remote desktop using reg
Enable the boot log to see list of drivers loaded during startup
Powershell cmdlet to create System Restore Point
Check the current account for seDebugPrivilege
Enable/disable system users via command line
View process that is consuming the most memory using powershell
Create an Alternate Data Stream from a file on an NTFS partition
Export running processes in CSV format
Lock Windows desktop using command line
Start explorer with a file or folder selected/highlighted
Dump VirtualBox image containing RAM and ELF headers
Set Time Zone of the system clock
Make folder inside a guest from the host
Force copy meterpreter binary to remote machines & run as system
Create n/w share called Apps, with read access & limit to 10 conns
Apps, with read access & limit to 10 connsList all the drives under My Computer using fsutil
Troubleshoot n/w packet drops with router statistics using pathping
List unsigned dlls for a specific process.
Obtain a list of Windows XP computers on the domain using PS
Open the System Properties window, with the Advanced tab selected
Advanced tab selectedUsing the dir command to find Alternate Data Streams
dir command to find Alternate Data StreamsUse procdump to obtain the lsass process memory.
procdump to obtain the lsass process memory.Run mimikatz in minidump mode & use mini.dmp from procdump
mimikatz in minidump mode & use mini.dmp from procdumpGet list of startup programs using wmic
Add a binary to an Alternate Data Stream
Execute a binary Alternate Data Stream Win 7/2008 using wmic
Show config & state info for Network Access Protection enabled client
Get computer system information, including domain name and memory, using wmic
Use the Package Manager in Windows to install the Telnet client on Windows Vista & higher
Secure delete a file/folder in Windows
Show all startup entries while hiding Microsoft entries. CSV output
Download files via commandline using PS
Fetch the last 10 entries from the Windows Security event log, in text format
Create a dll that runs calc on invoke
Run a command as another user
Get shutdown/reboot events from the last 1000 log entries using PS
Create a new snapshot of the volume that has the AD database and log files
Mount the snapshot
Run a process on a remote system using wmic
List the machines, with usernames, that were connected via RDP
List all process that are running on your system by remote users connected via RDP
Reset the Windows TCP\IP stack
List logged on users.
Set a static IP on a remote box
Bypass powershell execution policy restrictions
List running processes every second on a remote box
Get a list of running processes and their command line arguments on a remote system
Remotely enable and start the Volume Shadow Copy Service
Ping multiple IPs from ips.txt & see live hosts
ips.txt & see live hostsSet global proxy in Windows to point to IE proxy
Enumerate list of drivers with complete path information
View Group Policy Objects that have been applied to a system
Reset the WMI repository to what it was when the OS was installed
Create symbolic links in Windows Vista, 7 & higher
Enable the tftp client in Vista & higher
Obtain list of firewall rules on a local system
Get name of current domain controller
Look at content cached in kernel mode on IIS 7 and higher
Quick test to check MS15_034
MS15_034Get a list of all open Named pipes via Powershell
Possible VENOM detection on VirtualBox
VENOM detection on VirtualBoxList RDP sessions on local or remote in list format
Get a list of service packs & hotfixes using wmic for remote systems listed in file
Export wireless connection profiles
Unzip using PowerShell
Open the Network & Sharing center
Remotely stop/start ftp on several systems
To quickly find large files using cmd
Print RDP connections
List scheduled tasks & binaries
Display the "Stored User names and Passwords" window
List namespaces & classes in WMI via PowerShell
Convert Between VDI, VMDK, VHD, RAW disk images using VirtualBox
Change file extensions recursively
List IPs of running VirtualBox machines
Windows Privilege Escalation Slideshow
Enumerate packages with their OEM .inf filenames
Install a driver package using .inf file
Malware Hunting with Mark Russinovich and the Sysinternals
Windows Nano Server APIs
Start a Wi-Fi hotspot using cmd.exe
Disable UAC via cmdline
Turn off Windows firewall for all profiles
List Missing Updates
Export SAM and SYSTEM Dump password hashes offline
Convert Binary to base64 string to transfer across restricted RDP
Convert Base64 string to Binary
List services running as SYSTEM and possibly weak file permissions
Check Bitlocker status on a remote box
Export failed logon attempts
Alternate Data Streams and PS
Run the Windows Assessment tool for cpu and ram and disk
Port forward (proxy) traffic to remote host and port
Enable/Disable NetBIOS over TCP/IP
Compact multiple VDI files across folders
Full scan using WinDefender
Generate 32 char random password
Misc
Find files by name with cmd.exe
For files in %PATH%
For files not in %PATH%
%PATH%Find file by name with PowerShell
Resolve IP to Hostname
PowerShell 'Watch' Command
Get WiFi Passwords
Gather hostnames of machines on a network
Winpeas
References
Last updated
