Enumerate Windows
Windows Enumeration Techniques
Category | Technique | Description | Tools/Commands |
---|---|---|---|
System Information | Gather System Info | Collect basic system details such as OS version, architecture, and installed patches. | systeminfo wmic os get osarchitecture |
List Installed Updates | Identify installed patches and updates for vulnerability assessment. | wmic qfe get Get-Hotfix |
|
Environment Variables | Enumerate Environment Variables | Check for sensitive data stored in environment variables. | set Get-ChildItem Env: |
User Information | List Users and Groups | Identify local users and group memberships. | net users net localgroup, whoami /all |
Check Password Policies | Review password policies for potential weaknesses. | net accounts | |
Processes and Services | List Running Processes | Identify running processes for potential insights. | tasklist Get-Process |
Check Service Permissions | Find services with misconfigured permissions. | sc qc , accesschk.exe |
|
Network Configuration | View Network Interfaces | Get information on network interfaces and configurations. | ipconfig /all , Get-NetIPConfiguration |
List Open Ports | Identify open ports and listening services. | netstat -ano |
|
Check Firewall Rules | Review firewall settings and rules. | netsh advfirewall show allprofiles |
|
Scheduled Tasks | Enumerate Scheduled Tasks | Identify tasks that may run with elevated privileges. | schtasks /query , Get-ScheduledTask |
Registry Enumeration | Search for Sensitive Registry Entries | Look for registry keys that may contain credentials or configuration data. | reg query |
File System | Find Interesting Files and Directories | Search for files containing sensitive information like passwords or configuration files. | dir /s *pass* , Get-ChildItem |
Check File and Folder Permissions | Identify files or folders with weak permissions. | icacls , accesschk.exe |
|
Credentials | Check Credential Manager | Look for saved credentials in the Windows Credential Manager. | cmdkey /list |
Examine Browser Credentials | Review saved passwords and autofill data in browsers. | Use browser-specific tools | |
Logging and Auditing | Review Event Logs | Analyze event logs for anomalies or important information. | eventvwr.msc , Get-EventLog |
Network Shares | Enumerate Network Shares | Identify accessible network shares. | net view , net use |
Installed Applications | List Installed Software | Identify installed applications for potential vulnerabilities or management. | wmic product get , Get-WmiObject |
Mermaid Diagram of Windows Enumeration Techniques
graph LR A[User, Privilege, Group] B[Computer info] C[Network info] A --> A1[net users, net localgroup, whoami /all, net user username, Get-LocalUser] A1 --> A11[net accounts] B --> B1[OS] B1 --> B11[systeminfo, wmic os get osarchitecture] B1 --> B12[wmic qfe get, Get-Hotfix] B --> B2[Process and Services] B2 --> B21[tasklist, Get-Process] B21 --> B211[Permission check: sc qc, accesschk.exe] B --> B3[Registry] B3 --> B31[reg query] B --> B4[Scheduled Tasks] B4 --> B41[schtasks /query, Get-ScheduledTask] B --> B5[Environment] B5--> B51[set, Get-ChildItem Env:] B --> B6[Interesting Files/software] B6 --> B61[File/Folder Permission : icacls, accesschk.exe] B6 --> B62[wmic product get, Get-WmiObject] B7[Credentials]--> B71[cmdkey /list] B7 --> B72[findstr /si password *.txt *.ini *.config] B --> B8[Logging/Auditing] B8 --> B81[eventvwr.msc, Get-EventLog] C--> C1[Network] C1 --> C11[ipconfig /all, Get-NetIPConfiguration] C1 --> C12[Firewall: netsh advfirewall show allprofiles] C1 --> C13[route print, arp -a] C--> C2[Network share] C2 --> C21[net view, net use]