Windows enumeration

Manual post exploitation recon for windows targets

#Basics

#systeminfo
hostname

# Who am I?
whoami
echo %username%

# What users/localgroups are on the machine?
net users
net localgroups

# More info about a specific user. Check if user has privileges.
net user user1

# View Domain Groups
net group /domain

# View Members of Domain Group
net group /domain <Group Name>

# Firewall
netsh firewall show state
netsh firewall show config

# Network
ipconfig /all
route print
arp -A

# How well patched is the system?
wmic qfe get Caption,Description,HotFixID,InstalledOn

#Cleartext passwords

#Passwords in files

#Passwords in registry

#Checking for Kernel exploits

#Scheduled tasks

#Weak service permissions

#sc.exe

#Unquoted service paths:If the path contains a space and is not quoted,the service is vulnerable.

#Check for vulnerable drivers

#Group policy preferences

#Pint test blind RCE

#Same if powershell is available

#Firewall / AV / Defender

#Automated tools checklist

Last updated