14-2 D1 Flashcards
Windows Situational Awareness Commands:
___ - Displays local user accounts.
net user
Windows Situational Awareness Commands:
___ - Displays local group accounts.
net localgroup
Windows Situational Awareness Commands:
___ - Lists scheduled tasks to run at a specific time and date.
schtasks
SMB2 Negotiate Function Index Windows version: \_\_\_ Port#: \_\_\_ Logs: \_\_\_ Exploit: \_\_\_
version: WIN 2K8
port#: 445
Logs: Yes; 2. Guest/Admin.
exploit/windows/smb/ms09_050_smb2_negotiate_func_index
Windows Situational Awareness Commands: \_\_\_ - Manipulates routing table options: \_\_\_ - adds one \_\_\_ - deletes one \_\_\_ - prints routing table
route
ADD
DELETE
PRINT
Windows Situational Awareness Commands:
___ - Lists all running processes by name and process ID.
tasklist
Windows Situational Awareness Commands:
___ - Displays all active connections and listening ports, showing numerical addresses and ports only, and displays PID that owns the socket.
netstat -ano
Windows Situational Awareness Commands:
___ - Displays detailed configuration and processor information.
systeminfo
Windows Situational Awareness Commands:
___ - Displays remote shares and their associated connections.
net use
Windows Situational Awareness Commands / Powershell Commands:
___ - Display groups.
get-WmiObject -class win32_group
Windows Situational Awareness Commands / Powershell Commands:
___ - Display users.
get-WmiObject -class win32_useraccount
Netapi Exploit ms08_067 Windows version: \_\_\_ Port#: \_\_\_ Logs: \_\_\_ Exploit: \_\_\_
version: WIN 2K3
port#: 445
Logs: No
exploit/windows/smb/ms08_067/netapi
Windows hosts are often exploited using code-based remote exploits by using ___ or ___ exploits.
service-side
client-side
Windows Situational Awareness Commands / Powershell Commands:
___ - Lists running processes.
get-process
RPC/DCOM Exploit ms03_026 Windows version: \_\_\_ Port#: \_\_\_ Logs: \_\_\_ Exploit: \_\_\_
version: WIN XP
port#: 135
Logs: No
exploit/windows/dcerpc/ms03_026_dcom
Meterpreter Privilege Escalation:
___ - Releases impersonated privileges.
drop_token
Windows Situational Awareness Commands:
___ - Lists scheduled commands and programs to run at specific time and date.
at
Meterpreter Privilege Escalation:
___ - Elevate privileges to SYSTEM via one of three methods.
getsystem
Windows Situational Awareness Commands:
___ - Lists services.
net start
Meterpreter Privilege Escalation:
___ - Get all privileges from current process owner.
getprivs
Meterpreter Privilege Escalation:
___ - Injects meterpreter session into another running process.
migrate
Windows Situational Awareness Commands / Powershell Commands:
___ - Query the software Registry Key
get-ChildItem HKLM:\software
Windows Situational Awareness Commands:
___ - Prints the ARP table.
arp
Windows Situational Awareness Commands:
___ - Displays the Windows environment variables.
set
Windows Situational Awareness Commands:
___ - Displays the Windows version.
ver
Meterpreter Privilege Escalation:
___ - Impersonates privileges of running process.
steal_token
Windows Situational Awareness Commands:
___ - Lists all installed device drivers and their properties.
driverquery