Windows enumeration
Manual post exploitation recon for windows targets
#Basics
#systeminfo
hostname
# Who am I?
whoami
echo %username%
# What users/localgroups are on the machine?
net users
net localgroups
# More info about a specific user. Check if user has privileges.
net user user1
# View Domain Groups
net group /domain
# View Members of Domain Group
net group /domain <Group Name>
# Firewall
netsh firewall show state
netsh firewall show config
# Network
ipconfig /all
route print
arp -A
# How well patched is the system?
wmic qfe get Caption,Description,HotFixID,InstalledOn#Cleartext passwords
#Passwords in files
#Passwords in registry
#Checking for Kernel exploits
#Scheduled tasks
#Weak service permissions
#sc.exe
#Unquoted service paths:If the path contains a space and is not quoted,the service is vulnerable.
#Check for vulnerable drivers
#Group policy preferences
#Pint test blind RCE
#Same if powershell is available
#Firewall / AV / Defender
#Automated tools checklist
Last updated