❎
wiki.hackerlab.cz
search
Ctrlk
❎
wiki.hackerlab.cz
  • About me
  • Vulnerability Assessment
  • CLOUD PENTESTING
  • REST API - Bypasses and Privilege Escalations
  • Python Virtual Environment (VENV)
  • OSINT & Information Gathering
  • Web Pentesting
    • File Upload
    • JavaScript .maps
    • SSRF
    • LDAP Injection
    • Django ORM Exploitation
    • HTTP Request Smuggling
    • Server Side Template Injection (SSTI)
    • Insecure Deserialization
    • Brute force
    • Shell Fu - Oneliners
    • CORS
    • Special Chars & NULL Bytes
    • XSS
    • XXE
    • Nuclei
    • SQL Injection
    • Blind SQL Injection
    • SQLmap
    • NoSQL Injection
    • CRLF Injection
    • Input Validation - Fuzz1
    • HTTP Headers - X-Forwarded
    • Log4j
    • Enumeration with Wordlists
    • Bug Bounty - Web Recon
    • HTTP Proxy Override
    • CSV Injection
    • Windows Forbidden File Names
    • Path Traversal
    • OS Command Injection
    • Open Redirect
    • JWT Tool
    • Burp Extensions - TokenJAR & ATOR
    • Upload RCE
    • GUID and UUIDs
  • Toolset
    • Git - Repo and Tools
    • Docker for Pentesters
  • Infrastructure Pentesting
    • PostgreSQL
    • Active Directory (AD)
    • Mail Server Attacks
    • NFS Enumeration
    • Windows PostExploitation
      • Windows Enumeration
      • Powershell Payloads
      • Add RDP Account & Ride on Meterpreter
    • Dump File Analysis
  • Other Pentest Projects
    • Security Projects
  • WIFI Pentesting
    • Kali Linux - Alpha card AWUS 1900 (VirtualBox)
    • Active Card & Monitor Mode
    • Aircrack-ng Suite
  • Certs
  • Linux
    • Network Manager
  • Books
    • The Hacker Playbook 3
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Infrastructure Pentestingchevron-right
  2. Windows PostExploitation

Windows Enumeration

Manual and automated scripts for windows enumeration

hashtag
WIN PAESS

Automatic priv esc profiling scripts

LogoPEASS-ng/winPEAS at master · peass-ng/PEASS-ngGitHubchevron-right

hashtag
Identity

hashtag
System

hashtag
Users and Groups

hashtag
Net

hashtag
Shares, Account Policy, Autostart

hashtag
PowerShell

hashtag
Network

hashtag
Tasks

hashtag
Disk and Registry

LogoWindows EnumerationNoRed0xchevron-right
LogoPayloadsAllTheThings/Methodology and Resources/Windows - Privilege Escalation.md at master · swisskyrepo/PayloadsAllTheThingsGitHubchevron-right
LogoChecklist - Local Windows Privilege Escalation - HackTricksbook.hacktricks.xyzchevron-right

PreviousWindows PostExploitationchevron-leftNextPowershell Payloadschevron-right

Last updated 2 years ago

  • WIN PAESS
  • Identity
  • System
  • Users and Groups
  • Net
  • Shares, Account Policy, Autostart
  • PowerShell
  • Network
  • Tasks
  • Disk and Registry
whoami
whoami /priv
whoami /groups
whoami /all
hostname

set

echo %COMPUTERNAME%
echo %USERNAME%
echo %USERDOMAIN%
echo %USERDNSDOMAIN%

# wmic
wmic nicconfig get description,IPAddress,MACAddress
wmic product get name, version, vendor
wmic qfe get Caption, Description, HotFixID, InstalledOn
net user
net user administrator
net localgroup
net localgroup administrators
net share
net accounts
net start
# powershell
Get-LocalUser
Get-LocalGroup
Get-LocalGroupMember Administrators
arp -a
ifconfig /all
route print
tasklist

tasklist /SVC
tree /a /f

search password

REG QUERY HKLM /F "password" /t REG_SZ /S /K