Checklist

set PATH=%PATH%C:\Windows\System32;C:\Windows\System32\WindowsPowerShell\v1.0;

Basic enum / quick wins

whoami /all
cmdkey /list
systeminfo
net user
net user <current user>
net group
Get-History
(Get-PSReadlineOption).HistorySavePath
type <previous command output>
ls C:\Users\bob\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\

Do this for all available users; Post exploitation as well

Network and port enum

ipconfig /all
netstat -ano
route print

Installed software and service enum

Sensitive file enum

Process snooping

  1. Winpeas

  1. PowerUp

  1. PrivescCheck

Last case, dig through event log for events recorded by Script Block Logging. Maybe there will be a password lol.

  1. eventvwr

  2. Applicatioins and Services

  3. Microsoft

  4. Windows

  5. Powershell

  6. Operational

  7. Filter current log

  8. Event 4104

Last updated