Windows Forensics Commands - Networks Professionals
Windows Forensics Commands - Networks Professionals
Commands
Window Forensic Post Exploit Command
Network Discovery:
net view /all net
view
logicladisk get
Scan:
nbtstat -A indirizzoip for /L %I in (1,1,254) do ping -w 30 -n 1 192.168.1.%I | find
le pssword salvate:
Network:
netstat -e netstat
-nr netstat -
naob netstst -S
www.networksprofessional.com
print arp -a
ipconfig /all
netsh wlan
show interfaces
Start/Stop Firewall:
netsh advfirewall show rule name=all netsh
netsh advfirewall firewall add rule name="Open Port 80" dir=in action=allow
protocol=TCP localport=80
Utenti:
creo l'utente:
cambio password:
www.networksprofessional.com
net user nomeutente nuvapassword
Vari:
net users net localgroup administrators net group
name,lastlogin,badpasswordcount
nicconfig get
Service:
at tasklist
tasklist /svc
schtask
net start
www.networksprofessional.com
wmic job list brief start/stop
service:
rdesktop:
List Shadow
www.networksprofessional.com
polycy,
patch: set
gpresult /r
systeminfo
wmic qfe
Reboot:
shutdown.exe /r
%TIME%
www.networksprofessional.com
Follow Us
Networks Professionals
www.networksprofessional.com
Adi Tri Mukti
[email protected]
+6283120384126
www.networksprofessional.com