14-2 D1 Flashcards
Windows Situational Awareness Commands:
___ - Displays local user accounts.
net user
Windows Situational Awareness Commands:
___ - Displays local group accounts.
net localgroup
Windows Situational Awareness Commands:
___ - Lists scheduled tasks to run at a specific time and date.
schtasks
SMB2 Negotiate Function Index Windows version: \_\_\_ Port#: \_\_\_ Logs: \_\_\_ Exploit: \_\_\_
version: WIN 2K8
port#: 445
Logs: Yes; 2. Guest/Admin.
exploit/windows/smb/ms09_050_smb2_negotiate_func_index
Windows Situational Awareness Commands: \_\_\_ - Manipulates routing table options: \_\_\_ - adds one \_\_\_ - deletes one \_\_\_ - prints routing table
route
ADD
DELETE
PRINT
Windows Situational Awareness Commands:
___ - Lists all running processes by name and process ID.
tasklist
Windows Situational Awareness Commands:
___ - Displays all active connections and listening ports, showing numerical addresses and ports only, and displays PID that owns the socket.
netstat -ano
Windows Situational Awareness Commands:
___ - Displays detailed configuration and processor information.
systeminfo
Windows Situational Awareness Commands:
___ - Displays remote shares and their associated connections.
net use
Windows Situational Awareness Commands / Powershell Commands:
___ - Display groups.
get-WmiObject -class win32_group
Windows Situational Awareness Commands / Powershell Commands:
___ - Display users.
get-WmiObject -class win32_useraccount
Netapi Exploit ms08_067 Windows version: \_\_\_ Port#: \_\_\_ Logs: \_\_\_ Exploit: \_\_\_
version: WIN 2K3
port#: 445
Logs: No
exploit/windows/smb/ms08_067/netapi
Windows hosts are often exploited using code-based remote exploits by using ___ or ___ exploits.
service-side
client-side
Windows Situational Awareness Commands / Powershell Commands:
___ - Lists running processes.
get-process
RPC/DCOM Exploit ms03_026 Windows version: \_\_\_ Port#: \_\_\_ Logs: \_\_\_ Exploit: \_\_\_
version: WIN XP
port#: 135
Logs: No
exploit/windows/dcerpc/ms03_026_dcom