Post Exploitation: ​Workstation and Network Analysis

Course:  Joe Perry on “Post Exploitation Hacking” at Cybrary
Workstation and Network Analysis 

I. Linux
A. Workstation
•Netstat (+netstat -g/ -r/ -i/ -s)

B. Network
•Ping/traceroute •Ping –t 1 (Identify your default gateway)
•P0f [passive OS fingerprinting]

II. Windows
A. Workstation
•Net * (there’s a lot)

B. Network
net *  •Accounts; •Config; •Group; •Session; •Statistics; •View; •Start
Wmic [Windows Management Instrumentation] 
E.g., Wmic Useraccount
E.g., Wmic startup get caption,command

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: