Posts

Native MS Windows commands

list of useful commands during a penetration testing or red teaming exercise, even when having physical access to the system or having a remote shell
Native MS Windows commands
Native MS Windows commands Native MS Windows commands The following section provides a list of useful commands during a penetration testing or red teaming exercise, even when having physical access to the system or having a remote shell to communicate to the target. These commands are not limited to the following: Command Samples and Descriptions Command Sample Description nslookup nslookup Server nameserever.google.com Set type=any ls -d anydomain.com nslookup is used to query the DNS. The sample command does DNS zone transfer using nslookup. net view net view This displays a list of computers/domains and other shared resources. net share net share list="c:" This manages the shared resources and displays all information about the shared resources on the local system. net use net use \\[targetIP] [password] /u:[user] net use \\[targetIP]\[sharename] [password] /u:[user] This connects to any system on the same network; it can also be used for retrieving a list of network connections. net user net us…

About the author

Web wizard

Post a Comment