githubEdit

Enumeration

System Enumeration:

Display the system’s hostname: helps identify it among other devices.

hostname

Display detailed information about the system’s version and OS

systeminfo

Check Windows version

 wmic os get caption, version, osarchitecture
 systeminfo | findstr /B /C: "OS Name" /C: "OS Version" /C:"System Type"
    
 # wmic ( windows manager instrumentation command line ) 
 # qfe ( quick fix engineering ) 
 # to see whats patched
    
 wmic qfe get Caption,Description,HotFixID,InstalledOn
 wmic logicaldisk get caption,description,providername

Tasklist

tasklist /svc

Display All Environment Variables

Display Running process

Enumerating Always Install Elevated Settings

Display all service running with local system priv

Display all service you have Write permission

Collect auto run app


User Enumeration:

Display Privilege for current user

List groups the user belongs to

List all users on the system

Show detailed info about a specific user

List members of a local group

Logged-In Users

Get Password Policy & Other Account Information


Network Enumeration

Show full network configuration

Show ARP table (IP ↔ MAC mapping)

Display system routing table

Show active network connections with PIDs4

Named Pipes

search for all named pipes that allow write access


Password Hunting

Search File Contents for String

Search for File Extensions

Search on Password in specific range

Look for plaintext passwords in Windows setup files

User/Computer Description Field

Search for password in register

find admin AutoLogon credentials

Cmdkey Saved Credentials

Chrome Dictionary Files

PowerShell History File

Looking for StickyNotes DB Files

Windows Auto-login

SharpChrome

use to to retrieve cookies and saved logins from Google Chrome.

Usage:

LaZagne

retrieve credentials from a wide variety of software. Such software includes web browsers, chat clients, databases, email, memory dumps, various sysadmin tools, and internal password storage mechanisms (i.e., Autologon, Credman, DPAPI, LSA secrets, etc.

Usage:

SessionGopher

We can use it to extract saved PuTTY, WinSCP, FileZilla, SuperPuTTY, and RDP credentials.

Usage:


AV Enumeration

Check Windows Defender Status

List AppLocker Rules

Test AppLocker Policy

List all services, including antivirus software


Exploring Automated Tools

WinPEAS

WinPEAS is part of the PEAS (Privilege Escalation Awesome Scripts) suite. It is a script designed to automate the process of finding potential privilege escalation vectors on Windows systems.

Usage:

  • Download the WinPEASarrow-up-right file from the repository.

  • Upload the file to the target system and execute it.

Sherlock

Sherlock is a PowerShell script that scans for known vulnerabilities in the Windows operating system that can be exploited for privilege escalation.

Usage:

  • Download https://github.com/rasta-mouse/Sherlock

  • Run it in a PowerShell session with the command:

Watson

Watson is a vulnerability scanner that helps identify vulnerabilities based on the system’s patch level. It’s used to identify missing patches or configurations that could lead to privilege escalation.

Usage:

PowerUp

PowerUp is part of PowerSploit, a collection of PowerShell scripts that can be used for post-exploitation. PowerUp specifically looks for privilege escalation opportunities on Windows systems.

Usage:

Seatbelt

Local info gathering (users, creds, configs, escalation paths)

Usage:

  • Download https://github.com/GhostPack/Seatbelt.git

  • Run the script in PowerShell:

JAWS (Just Another Windows Script)

JAWS is a PowerShell script used for post-exploitation and enumeration. It focuses on gathering information about the system, its users, and potential privilege escalation paths.

Usage:

Mimikatz

It allows for the extraction of plaintext credentials from memory, password hashes from local SAM/NTDS.dit databases, advanced Kerberos functionality, and more.

Usage:

  • Download https://github.com/gentilkiwi/mimikatz

  • Run the script in PowerShell:


Transfer Files

Certutil

certutil.exearrow-up-right, whose intended use is for handling certificates but can also be used to transfer files from attacker to victim machine by either downloading a file to disk or base64 encoding/decoding a file.

Usage:

  • Run the script in PowerShell:


Kernel Exploit

Search using KB

https://github.com/SecWiki/windows-kernel-exploitsarrow-up-right