Extract the name of the operating system (Name) as well as its version (Version) and architecture (System):
C:\> systeminfo | findstr /B /C:"OS Name"/C:"OS Version"/C:"System Type"OS Name: Microsoft Windows 10 ProOS Version: 10.0.16299 N/A Build 16299System Type: X86-based PC# In italian the info changesC:\> systeminfo | findstr /B /C:"Nome SO"/C:"Versione SO"/C:"Tipo sistema"
Running Processes and Services
List the running processes:
C:\> tasklist/SVC
Networking Information
Display the full TCP/IP configuration of all adapters:
C:\> ipconfig/all
Display the networking routing tables:
C:\> routeprint
Display active network connections:
C:\> netstat-ano
Firewall Status and Rules
Inspect the current firewall profile:
C:\> netshadvfirewallshowcurrentprofile
List firewall rules:
C:\> netshadvfirewallfirewallshowrulename=all
Scheduled Tasks
Display scheduled tasks:
C:\> schtasks/query/foLIST/v
Installed Applications and Patch Levels
List applications and related version that are installed by the Windows Installer (it will not list applications that do not use the Windows Installer)
C:\> wmicproductgetname,version,vendorNameVendorVersionMicrosoftOneNoteMUI (English) 2016 Microsoft Corporation 16.0.4266.1001MicrosoftOfficeOSMMUI (English) 2016 Microsoft Corporation 16.0.4266.1001...
Wmic can also be used to list system-wide updates by querying the Win32_QuickFixEngineering (qfe) WMI class:
List all drives that are currently mounted or physically connected but unmounted:
C:\> mountvolCreates, deletes, or lists a volume mount point....Possible values for VolumeName along with current mount points are: \\?\Volume{25721a7f-0000-0000-0000-100000000000}\*** NO MOUNT POINTS *** \\?\Volume{25721a7f-0000-0000-0000-602200000000}\ C:\ \\?\Volume{78fa00a6-3519-11e8-a4dc-806e6f6e6963}\ D:\
Device Drivers and Kernel Modules
This technique relies on matching vulnerabilities with corresponding exploits, we'll need to compile a list of drivers and kernel modules that are loaded on the target.
Check the status of the AlwaysInstallElevated registry setting. If this setting is enabled, we could craft an MSI file and run it to elevate our privileges: