👾
Rootkid - Cyber Journal
Portfolio
  • 👩‍🚀Introduction
    • 🤖About Cyber Journal & Rootkid
    • 📜License Agreement
    • ⚠️Disclaimer
  • 📚Exam Prep Notes
    • 🗒️KLCP Exam (PEN-103) - Notes
      • 1. Linux Fundamentals
      • 2. Introduction
      • 3. About Kali Linux
      • 4. Getting Started with Kali Linux
      • 5. Installing Kali Linux
      • 6. Configuring Kali Linux
      • 7. Helping Yourself and Getting Help
      • 8. Securing and Monitoring Kali Linux
      • 9. Debian Package Management
      • 10. Advanced Usage
      • 11. Kali Linux in the Enterprise
      • 12. Introduction to Security Assessments
      • 13. Conclusion: The Road Ahead
    • 📒ISO/IEC 27001:2022 Lead Auditor - Notes
      • ISO - Training - Day - 1
      • ISO - Training - Day - 2
      • ISO - Training - Day - 3
      • ISO - Training - Day - 4
      • Practice Questions - Notes
      • Other PDF References
    • 📑Junior Penetration Tester (eJPTv2) - Notes
      • 💡Assessment Methodologies
        • 🔍Information Gathering
          • 🌏Passive Information Gathering
          • 🧐Active Information Gathering
        • 👣Footprinting & Scanning
          • 🗺️Mapping a Network
          • 🎛️Port Scanning
        • 🕵️Enumeration
          • 📜SMB Enumeration
          • 📂FTP Enumeration
          • 🐚SSH Enumeration
          • 🕸️HTTP Enumeration
          • 🗄️MySQL & MSSQL Enumeration
        • 🐛Vulnerability Assessment
          • 🩸Case Study: Heartbleed Vulnerability (CVE-2014-0160)
          • 🔵Case Study: EternalBlue Vulnerability (CVE-2017-0143)
          • 👨‍💻Case Study: Log4J Vulnerability (CVE-2021-44228)
      • 🧰Assessment Methodologies: Auditing Fundamentals
      • 📶Host & Network Penetration Testing
        • 💻System/Host Based Attacks
          • 🪟Overview Of Windows Vulnerabilities
          • 💣Exploiting Windows Vulnerabilities
            • 🧨Exploiting Microsoft IIS WebDAV
            • 🧨Exploiting WebDAV With Metasploit
            • 🧨Exploiting SMB With PsExec
            • 🧨Exploiting Windows MS17-010 SMB Vulnerability (EternalBlue)
            • 🧨Exploiting RDP - Brute Force
            • 🧨Exploiting Windows CVE-2019-0708 RDP Vulnerability (BlueKeep)
            • 🧨Exploiting WinRM
          • 📈Windows Privilege Escalation
            • 🔥Windows Kernel Exploits
            • 🔥Bypassing UAC With UACMe
            • 🔥Access Token Impersonation
          • 🗃️Windows File System Vulnerability - Alternate Data Streams
          • 💳Windows Credential Dumping
            • 🔑Searching For Passwords In Windows Configuration Files
            • 🔑Dumping Hashes With Mimikatz
            • 🔑Pass-The-Hash Attacks
          • 💎Linux Vulnerabilities
          • 🎰Exploiting Linux Vulnerabilities
            • 🐚Exploiting Bash CVE-2014-6271 Vulnerability (Shellshock)
            • 🗄️Exploiting FTP - Linux
            • 🔐Exploiting SSH - Linux
            • 📭Exploiting SAMBA - Linux
          • ‼️Linux Privilege Escalation
            • 💥Linux Kernel Exploits
            • 💥Exploiting Misconfigured Cron Jobs
            • 💥Exploiting SUID Binaries
          • 🔐Linux Credential Dumping
        • 📶Network-Based Attacks
          • 📦Tshark & Filtering Basics
          • 🕷️Arp Poisoning
        • 💣The Metasploit Framework (MSF)
        • 💥Exploitation
          • 🖲️Vulnerability Scanning
          • ⚠️Searching For Exploits
          • 🐚Bind & Reverse Shells
          • 👾Exploitation Frameworks
          • 🪟Windows Exploitation
          • 🥌Linux Exploitation
          • ☣️AV Evasion & Obfuscation
        • 🚩Post-Exploitation
          • 🌬️Windows Local Enumeration
          • 📟Linux Local Enumeration
          • 🚜Transferring Files To Windows & Linux Targets
          • 🔼Upgrading Shells
          • 👀Windows Privilege Escalation
          • ⚒️Linux Privilege Escalation
          • 🔮Windows Persistence
          • 🧙Linux Persistence
          • 〰️Dumping & Cracking Windows Hashes (NTLM Hashes)
          • 🍘Dumping & Cracking Linux Password Hashes
          • ➿Pivoting Overview
          • 🧹Clearing Your Tracks On Windows & Linux
        • 🧑‍🔬Social Engineering Fundamentals
      • 🕸️Web Application Penetration Testing
        • ℹ️Intro to Web
        • 🎯Directory Enumeration
        • 🧰BurpSuite and ZAP-Proxy Overview
        • 🛠️Nikto, SQLMap, XSSer & Hydra Overview
      • 👽Extra Resources
        • ➕CIDR Conversion Table
        • 📦Machines or Lab Solved to Practice
    • 📓Certified in Cybersecurity - (ISC)2 - Notes
      • 📝Chapter-1 Security Controls - Notes
      • 📝Chapter-2 Incident Response, Business Continuity & Disaster Recovery - Notes
      • 📝Chapter 3: Access Control Concepts - Notes
      • 📝Chapter 4: Network Security - Notes
      • 📝Chapter 5: Security Operations - Notes
    • 📕Certified Ethical Hacker v12 - Practical - Notes
      • 👣Module 02: Footprinting and Reconnaissance
      • 🔎Module 03: Enumeration
      • Module 04: Scanning Networks
      • Module 05: Vulnerability Analysis
      • 💻Module 06: System Hacking
      • 🐛Module 07: Malware Threats
      • 🧙Module 08: Sniffing
      • 🐧Module 09: Social Engineering
      • ⚠️Module 10: Denial-of-Service
      • 🪝Module 11: Session Hijacking
      • Module 12: Evading IDS, Firewalls, and Honeypots
      • 🗄️Module 13: Hacking Web Servers
      • Module 14: Hacking Web Applications
      • 💉Module 15: SQL Injection
      • Module 16: Hacking Wireless Networks
      • Module 17: Hacking Mobile Platforms
      • Module 18: IoT and OT Hacking
      • Module 19: Cloud Computing
      • Module 20: Cryptography
      • Extra Resources
        • 📚Helpful Resources
        • 📜Cheat Sheet
  • ✍️Blogs
    • Mastering the Art of Logic Flaws: Unraveling Cyber Mysteries !!!
    • How to write a Detailed Vulnerability Report
    • Payment Gateway Bypass on Government Domain.
Powered by GitBook
On this page
  • Enumerating System Information
  • Meterpreter Commands for System Information:
  • Windows Command Line Commands for System Information:
  • Enumerating Users & Groups
  • Meterpreter Commands for Users & Groups:
  • Windows Command Line Commands for Users & Groups:
  • Enumerating Network Information
  • Windows Command Line Commands for Network Information:
  • Enumerating Processes & Services
  • Meterpreter Commands for Processes & Services:
  • Windows Command Line Commands for Processes & Services:
  • Automating Windows Local Enumeration
  • Windows Local Enum Scripts
  • MSFconsole Post-exploitation Modules for Windows:
  • Meterpreter Command:
  • Getting Jaws-Enum Script on Target System:

Was this helpful?

  1. Exam Prep Notes
  2. Junior Penetration Tester (eJPTv2) - Notes
  3. Host & Network Penetration Testing
  4. Post-Exploitation

Windows Local Enumeration

Enumerating System Information

  • After gaining initial access to a target system, it is always important to learn more about the system like, what OS is running as well as the OS version. This information is very useful as it gives us an idea of what we can do and what type of exploits we can run.

  • What are we looking for?

    • Hostname

    • OS Name (Windows 7, 8 etc)

    • OS Build & Service Pack (Windows 7 SP1 7600)

    • OS Architecture (x64/x86)

    • Installed updates/Hotfixes

Meterpreter Commands for System Information:

  • getuid – Retrieve the user ID and privilege level of the current session.

  • sysinfo – Display information about the target system, such as operating system details and hardware configuration.

Windows Command Line Commands for System Information:

  • hostname – Display the name of the host (computer) on which the command is executed.

  • systeminfo – Provide detailed information about the operating system and system hardware.

  • wmic qfe get Caption, Description, HotFixID, InstalledOn – List installed Windows updates along with their details.

  • type eula.txt – Display the content of the "eula.txt" file.

Enumerating Users & Groups

  • After gaining initial access to a target system, it is always important to learn more about the system like, what user account you have access to and other user accounts on the system.

  • What are we looking for?

    • Current user & privileges

    • Additional user information

    • Other users on the system

    • Groups

    • Members of the built-in administrator group

Meterpreter Commands for Users & Groups:

  • getuid – Display the current user's ID and privilege level.

  • getprivs – Show the privileges held by the current session.

  • post/windows/gather/enum_logged_on_users – Use Metasploit's post-exploitation module to enumerate users logged on to the target system.

Windows Command Line Commands for Users & Groups:

  • whoami – Display the name of the currently logged-in user.

  • whoami /priv – List privileges held by the current user.

  • query user – Show information about currently logged-in users.

  • net users – List all user accounts on the system.

  • net user <user_name> – Display information about a specific user account.

  • net localgroup – List local user groups on the system.

  • net localgroup <group_name> – Display information about a specific local user group.

Enumerating Network Information

What are we looking for?

  • Current IP address & network adapter

  • Internal networks

  • TCP/UDP services running and their respective ports

  • Other hosts on the network

  • Routing table

  • Windows Firewall state

Windows Command Line Commands for Network Information:

  • ipconfig – Display IP configuration information for all active network interfaces.

  • ipconfig /all – Show detailed IP configuration information for all active network interfaces.

  • route print – Display the routing table, showing network routes and gateway addresses.

  • atp -a – List scheduled tasks on the system.

  • netstat -ano – Show active network connections along with associated processes and port numbers.

  • netsh firewall show state – Display the state of the Windows Firewall.

  • netsh advfirewall firewall dump – Dump the configuration of the Advanced Firewall settings.

Enumerating Processes & Services

  • After gaining initial access to a target system, it is always important to learn more about the system like, what processes, services and scheduled tasks are currently running.

  • What are we looking for?

    • Running processes & services

    • Scheduled tasks

  • A process is an instance of a running executable (.exe) or program.

  • A service is a process which runs in the background and does not interact with the desktop.

Meterpreter Commands for Processes & Services:

  • ps – List running processes on the target system.

  • pgrep explorer.exe – Find the Process ID (PID) of the explorer.exe process.

  • migrate <proc_id> – Migrate the Meterpreter session to the specified process.

Windows Command Line Commands for Processes & Services:

  • net start – Display a list of started services.

  • wmic service list brief – List installed services with brief details using Windows Management Instrumentation (WMI).

  • tasklist /SVC – List running processes and associated services.

  • schtasks /query /fo LIST /V – Query scheduled tasks and provide detailed information.

Automating Windows Local Enumeration

  • In addition to performing local enumeration manually, we can also automate the process with the help of a few scripts and MSF modules.

  • While local enumeration techniques/commands are important to know, as a penetration tester, you will need to be time efficient. As a result, you will need to learn how to utilize various automated enumeration scripts.

  • In addition to automating the process of enumerating information like system information, users & groups etc, these automated enumeration scripts will also provide you with additional information regarding the target system like; privilege escalation vulnerabilities, locally stored passwords etc.

Windows Local Enum Scripts

MSFconsole Post-exploitation Modules for Windows:

  • post/windows/gather/win_privs – Gather information about privileges on a Windows system.

  • post/windows/gather/enum_logged_on_users – Enumerate users currently logged on to a Windows system.

  • post/windows/gather/checkvm – Check if the target is a virtual machine.

  • post/windows/gather/enum_applications – Enumerate installed applications on the target Windows system.

  • post/windows/gather/enum_computers – Enumerate domain computers using Windows Management Instrumentation (WMI).

  • post/windows/gather/enum_patches – Enumerate installed patches on the target system.

  • post/windows/gather/enum_shares – Enumerate shared folders on the target Windows system.

Meterpreter Command:

  • show_mount – Display the mounted drives on the target system.

Getting Jaws-Enum Script on Target System:

  1. Visit the GitHub repository of Jaws-Enum and copy the script from the RAW tab.

  2. Paste the copied script on the attacking machine.

  3. Use a Meterpreter shell to upload the script to the victim's temporary folder using the "upload <file_path>" command.

  4. On the victim's machine, run Jaws-Enum using the following command: powershell.exe -ExecutionPolicy Bypass -File .\\jaws-enum.ps1 -OutputFilename JAWS-Enum.txt




Hacker's Mantra:Hackers see the invisible and do the impossible.

PreviousPost-ExploitationNextLinux Local Enumeration

Last updated 10 months ago

Was this helpful?

- Just Another Windows (Enum) Script - JAWS is PowerShell script designed to help penetration testers (and CTFers) quickly identify potential privilege escalation vectors on Windows systems. It is written using PowerShell 2.0 so 'should' run on every Windows version since Windows 7.

📚
📑
📶
🚩
🌬️
JAWS