Basic Methodology
System Information
systeminfosysteminfo | findstr /B /C:"OS Name" /C:"OS Version" /C:"System Type"tasklist /svc
List running services
User Information
whoaminet user <username>whoami /privwhoami /groupsnet user
Quick Win Tools
winpeas (fade the haters, learn about the output and run this to save time!)
PowerUp
SharpUp
Seatbelt
accesschk.exe
windows exploit suggester ng (less likely on OSCP but use as last-ish resort)
Firewall Info
Scheduled Tasks
Check Read/Write Permissions on Folders/Files
Unmounted Drives
AlwaysInstallElevated Check
If the settings are enabled (REG_DWORD 0x1) then we can craft a MSI and elevate
Password Hunting (Desperate Times)
Look for raw passwords in registry
https://www.praetorian.com/blog/how-to-detect-and-dump-credentials-from-the-windows-registry/
Last updated