攻防对抗中常用的windows命令(渗透测试和应急响应)

本文提供了一系列渗透测试和应急响应的实用命令,包括信息收集、系统操作、进程管理、账户控制、远程共享等关键技能,适用于网络安全专业人员进行安全评估和事件处理。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

一、渗透测试



1、信息收集类


#查看系统信息
>systeminfo

1070321-20181223105010615-759979697.png

#查看用户信息
>net user
>net user xxx

1070321-20181223105306292-828532120.png

#查看网络信息
>ipconfig /all
>route print
>netstat -abon
>netstat -s
>nbtstat -c
>nbtstat -n
>arp -a

1070321-20181223105606608-464593211.png
1070321-20181223105506279-417281017.png
1070321-20181223113437763-1210643339.png
1070321-20181223113553952-1021354183.png

#查询域信息
>net time /domain
>net view /domain
>net user /domain
>net group "domain admins" /domain
>dsquery comoputer
>dsquery server
>dsquery group
>dsquery user
>dsget group "CN=Administrators,CN=Builtin,DC=foo,DC=com" -members

1070321-20181223111119793-1126368196.png
1070321-20181223110847885-1692120989.png
1070321-20181223110944830-689143350.png

# 抓取认证信息
>.\getpassword

1070321-20181223112743641-256110548.png

2、操作类


#用户的添加、删除、配置权限组(加$符号在最后能起到隐藏效果)、切换用户
>net user pentest 123456 /add
>net localgroup administrators pentest /add
>net user pentest /del
>runas /noprofile /user:administrator [command] 
#网络类操作
>netsh interface ip set address name="本地连接" source=static addr=192.168.0.106 mask=255.255.255.0
>netsh interface ip set address name="本地连接" gateway=192.168.0.1 gwmetric=0
>netsh interface ip set dns name="本地连接" source=static addr=114.114.114.114 register=PRIMARY
>netsh interface portproxy add v4tov4 listenport=3340 listenaddress=a.b.c.d connectport=3389 connectaddress=w.x.y.z #端口转发
>netsh advfirewall firewall add rule name=”forwarded_RDPport_3340” protocol=TCP dir=in localip=w.x.y.z  localport=3340 action=allow#修改防火墙
>arp -d #清除arp表
#IPC控制类
>net use \\ip\ipc$ [password] /user:[username] #username 和 password均为空的时候建立的空连接
>net use h: \\ip\c:$
>net view \\ip
>net share #查看本地共享
>net share ipc$ [/del]#开启关闭ipc共享
>net share c$ [/del]#开启关闭c共享

二、应急响应类(功能类似的以介绍wmic为主)



1、系统信息类:

>systeminfo
>wmic os
>wmic cpu
>wmic nteventlog #系统事件日志  
>wmic computersystem

2、进程、服务类


>tasklist #查看进程
>tasklist | findstr "evil.exe"
>taskkill /f /t /im evil.exe 
>wmic process list full
>wmic process get xxx,xxx,xxx
>wmic process where processid="2345" delete  #删除进程 
>wmic process call create "C:\Program Files\Tencent\QQ\QQ.exe"  #创建进程
>wmic process where name="jqs.exe" get executablepath  #查看进程执行路径
>wmic service [list full] [get xxxx,xxxx]
>wmic service where name="xxx" call [startservice | stopservice | pauseservice | delete ]

3、账户、域、工作组类


>wmic useraccount 
>wmic sysaccount
>wmic computersystem get domain #查看域\工作组
>wmic group
>wmic netlogin #网络登录信息
>wmic logon #登录日志 

4、共享、远程、启动项类


>wmic /node:"a.b.c.d /password:"xxxxxx" /user:"administrator" #远程连接对方
>wmic share
>wmic share where name='x$' call delete
>wmic share call create "","xxx","3","TestShareName","","c:\xxx\xxx",0 #开启共享
>wmic startup list #检查启动项

5、小工具代码


批处理代码,很简单,用作应急响应的快速信息收集,亲测有效

for /F %%i in ('whoami') do ( set commitid=%%i)
set path1=C:\Users
set path3=\Desktop\
set path2=%commitid:~6%
set path4=%path1%%path2%%path3%
set floder=report\
set var=%path4%%floder%
mkdir %var%
set path5=info.txt
set var1=%var%%path5%
cd %var%
systeminfo  >> info.txt
netstat -abo >> netflow.txt
netstat -abo >> netflow.txt
netstat -abo >> netflow.txt
netstat -abo >> netflow.txt
netstat -abo >> netflow.txt
wmic process list full /format:hform >> process.html
wmic service list full /format:hform >> services.html
wmic useraccount list full /format:hform >> user.html
wmic sysaccount list full /format:hform >> sysaccount.html
wmic group list full /format:hform >> group.html
wmic logon list full /format:hform >> logonlog.html
wmic netlogin list full /format:hform >> netloginlog.html
wmic job list full /format:hform >> job.html

转载于:https://www.cnblogs.com/KevinGeorge/p/10164188.html

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值