Windows Enumeration

Users

Info about user in use:

C:\Users\student> whoami
client251\student
C:\Users\student> net user student

Discover other user accounts on the system

C:\Users\student>net user
User accounts for \\CLIENT251
-------------------------------------------------------------------------------
admin                    Administrator            DefaultAccount
Guest                    student                  WDAGUtilityAccount
The command completed successfully.

Hostname

Discover the hostname:

C:\Users\student>hostname
client251

Operating System Version and Architecture

Extract the name of the operating system (Name) as well as its version (Version) and architecture (System):

Running Processes and Services

List the running processes:

Networking Information

Display the full TCP/IP configuration of all adapters:

Display the networking routing tables:

Display active network connections:

Firewall Status and Rules

Inspect the current firewall profile:

List firewall rules:

Scheduled Tasks

Display scheduled tasks:

Installed Applications and Patch Levels

List applications and related version that are installed by the Windows Installer (it will not list applications that do not use the Windows Installer)

Wmic can also be used to list system-wide updates by querying the Win32_QuickFixEngineering (qfe) WMI class:

Readable / Writable Files and Directories

Find a file with insecure file permissions in the Program Files directory:

Searching for any object can be modified (Modify) by members of the Everyone group:

Unmounted Disks

List all drives that are currently mounted or physically connected but unmounted:

Device Drivers and Kernel Modules

This technique relies on matching vulnerabilities with corresponding exploits, we'll need to compile a list of drivers and kernel modules that are loaded on the target.

We first produce a list of loaded drivers:

Request the version number of each loaded driver:

Binaries That AutoElevate

Check the status of the AlwaysInstallElevated registry setting. If this setting is enabled, we could craft an MSI file and run it to elevate our privileges:

Last updated

Was this helpful?