Enumeration
You can also use the below Guide for enumeration.
http://michalszalkowski.com/security/windows/cmd-powershell/
Enumeration
PowerShell Commands
# To see hostname and username
whoami
# To see the group of current user.
whoami /groups
# Existing Users List.
Get-LocalUser
# List of Groups (Existing Groups)
Get-LocalGroup
# Finding the member of the group
Get-LocalGroupMember <Name of the group>
# Operating System, Version architecture information.
systeminfo
# Network information
ipconfig /all
# Routing information
route print
# List of active network connections.
netstat -ano
# To Get List of installed software 32 bit
Get-ItemProperty "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*" | select displayname
# To Get List of installed software 64 bit
Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*" | select displayname
# To get list of running Processes
Get-Process
# Now if we got the List of process and then we want to see the location of the binary file of the Process then we can use below command:
where /R C:\ *NonStandardProcess* # CMD Command
# Note Using powershell command I am unable to find NonStandartProcess. If are using Powershell and want to search for any process binary then use below command:
cmd.exe /c "where /R C:\ *NonStandardProcess* "
# Gives all ip in Address Resolution Protocol (ARP) table
arp -aYou can do common enumeration mentioned above using below ps1 file. This will save the outout in .txt file.
You can transfer file to kali linux and paste the content to Notes.
Powershell Search Command
For more info:
CMD Commands
Last updated
