Windows Enumeration Script for Pentesters (OSCP)
WES is Powershell script desgined for penetration testers, CTFers and specially for OSCP to enumeration information for particular Windows Target machine.
Usage: Download this script.
Run from within CMD shell and write out to file. CMD C:\Users\user\Downloads\WindowsEnumerationScript> powershell.exe -ExecutionPolicy Bypass -File .\WindowsEnumerationScript.ps1 -OutputFilename WindowsEnumerationScript_Results.txt
Run from within CMD shell and write out to screen. CMD C:\Users\user\Downloads\WindowsEnumerationScript> powershell.exe -ExecutionPolicy Bypass -File .\WindowsEnumerationScript.ps1
Run from within PS Shell and write out to file. PS C:\Users\user\Downloads\WindowsEnumerationScript> .\WindowsEnumerationScript.ps1 -OutputFileName WindowsEnumerationScript_Results.txt
Run from within CMD shell and write out to screen. PS C:\Users\user\Downloads\WindowsEnumerationScript> .\WindowsEnumerationScript.ps1
Run by just right click on file and select run with powershell :)
- Target System Information
- Network Information (interfaces, arp, netstat)
- Routing Tables
- Environment Variables
- Connected Drives
- Firewall Config
- Credentials Manager
- Local Group and Administrators
- User directories
- Sam Backup Files
- Installed Software Directories
- Softwares in Registry
- Folder Permissions
- Unquoted Service Paths
- Scheduled Tasks
- Startup Programs
- Hosts File Content
- Running Services
- AlwaysInstallElevated Registry Key Check
- Recent Used programs
- Modified Items
- Stored Credentials
- User Privilege
- Logged in User
- Local Users
- Current Users
- Running Processes
Thanks to all :)