🔎Windows Post Enumeration

If SYSTEM or SAM found in winPEAS use one of this:
python2 pwdump.py /tools /SYSTEM /tools/SAMAutomatic
Wesng:
python3 wesng.py /tools/systeminfo.txt -i 'Elevation of Privilege' --exploit-only | moreManual:
Get stored passwords:
cmdkey /listrunas /savecred /user:admin C:\Path\to\reverse.exefindstr /SIM /C:"password" *.txt *.ini *.cfg *.config *.xml *.git *.ps1 *.yml
findstr /SIM /C:"GitLab" *.txt #Replace GitLab with any keywordSystem info (cmd):
systeminfo | findstr /B /C:"OS Name" /C:"OS Version" /C:"System Type"Check files with pass in name or .config in current directory recursively:
dir /s *pass* == *.configList all scheduled tasks:
schtasks /query /fo LIST /vTo check all processes running:
get-processCheck password in registry:
reg query HKLM /f password /t REG_SZ /sreg query HKCU /f password /t REG_SZ /sGet patches:
wmic qfeTo get disks:
wmic logicaldiskTo check privileges:
whoami /privTo check groups involved in:
whoami /groupsTo check users:
net userCan also check specific user with:
net user administratorWe can check group details from above command with:
net localgroupTo look at arp table:
arp -a Print route:
route print For active connections:
netstat -anoSearch password (In the directory)
findstr /si password *.txt *.ini *.configCheck Firewall and AV
To check windows defender
sc query windefendCheck all processes
sc queryex type= serviceCheck firewall :
netsh advfirewall firewall dumpnetsh firewall show statenetsh firewall show configLast updated
Was this helpful?