Windows
Windows
Versions
Number or ID
Versions
Files
Launcher paths
For WINDOWS NT 6.1,6.0
For WINDOWS NT 5.2, 5.1, 5.0
FOR WINDOWS 9x
for WINDOWS NT 4.0, 3.51, 3.50
System information commands
command net/domain
Command
Description
Remote commands
Command
Description
Network commands
Command
Description
Functional commands
Command
Description
MISC. commands
Locking the workstation
Disable Windows Firewall
Create port forward (*need admin access)
enable cmd
PSEXEC command
Remote file execution with specific identity information
Execution of command with special hash
Run the command on the remote system
Terminal service (RDP)
Start RDP
RDP tunnel from port 443 (need to restart the terminal service)
Remove network authentication by adding an exception in the firewall
Import task from XML file
WMIC command
Command
Description
WMIC [alias] [where] [clause]
Run the file in smb with specific identity information
Remove the software
Remote user access
Show processes in real time
Start RDP
The list of times that the user has entered
Search services for unquoted routes
Copy of Volume shadow
POWERSHELL environment
Bypass AMSI
Disable realtimemonitoring
List of all users
List of all domains
Get AD credentials using donotrequirepreauth
Deleting security reports and programs (for SVR01)
Extract the version of the operating system inside the CSV file
List of running services
Using ps drive for permanent sharing
Files written on 8/20
Get file from http
tcp port connections (scanner)
Ping command with 500 millisecond timeout
Basic authentication window
Run the exe file (from cmd.exe) every 4 hours between August 8-11, 2013, device 0800-1700
Run Powershell as
Upload with powershell
Email sender
Activating remote access to powershell (requires identity information)
hostname and ip list for all domains
Download from Powershell from specific path
Display Powershell data
Using powershell to run meterpreter from memory
in the attacking system
Start the listener in the attacking system
On the target system (run powershell(x86))
Encodemeterpreter.ps1 [7]
Using powershell to start meterpreter (second method)
On bt attack box
in the attacking system
Start the listener in the attacking system
In the target system (1: download the shell code, 2: execute)
Identification of vulnerable domains with powerup
Windows registry
operating system information
Product Name
Installation Date
registered name
System boot information
Time zone information (in minutes from UTC)
Map of network drivers
Mounted devices
usb devices
Activation of IP forwarding
Password keys: LSA secret cat certain vpn, autologon, other passwords
Audit policy information
Kernel and user services
software installed in the system
Installed software for the user
Latest documents
The last positions of the user
URLs typed
MRU lists
The last registry key used
Launch paths
Activation of Remote Desktop
Get Windows information with dsquery
List of domain users
List of domain groups domain=victim.com
List of domain administrators
List of user groups
Get the entered user id
List of users who have not been active in the last two weeks
Add user
Delete user
List of domain operating systems
List of site names
List of all subnets in the site
List of services in the site
Get domain servers
DC list of the site
Script writing
Create ping sweep
Create a loop inside the file
domain brute forcer operation
account closing(lockout.bat)
DHCP exhaustion operation
DNS reverse lookup process
Search all the paths to find the files that contain PASS and display the details of that file
Malicious domain simulation (Application for IDS test)
Operation of IE web looper (traffic generator)
Get access to executive services
Spinning Reboot (replace /R with /S to shutdown):
Create a shell using vbs (requires identity information)
Scheduling the task
Scheduling the task (ST=start time, SD=start date, ED=end date) *need admin access
Always schedule task [10]
Instructions for working with smb
Log in with a specific user
Login without password
Change password
Show shared route
Show the specified route
Login to Shell
Get users along with password hash
Guess different smb passwords
rpcclient commands
entering the system
Show user information
Show users
Show permissions
Change user access
Show printers
NTLM extraction from ntds.dit file
Gather information using SharpHound
Gather information about Sql Server
Obtain AS-REP Roast hash
List of available ips without using nmap
Service identification with Test-WSMan
Enumerate OU’s
Retrieve users in ‘ICS’ OU
SharpHound Collect
Impersonate Token of nuclear\vdadmin (on psexec session)
Last updated