Windows PE Methodology
Information to Look Out for
User Information
Current User
Groups that the Current User is in
User Privilege Token
Obtain a list of all local users
Obtain a list of all local group
Obtain a list of member in the Local Group
System Information
Get system information
Get all network interfaces
Get routing table
Display all active network connections
Get all installed 32-bit applications
Get all installed 64-bit applications
Get all process that is currently running
File Search in Machine
Search for file in Windows
Searching for documents with specific extensions
Command history
Obtain history of commands executed
Obtain history of command executed recorded by PSReadline
Runas command
Download files from external web server
Download File
Service binary Hijacking
List all services running
Get the Access Control List (ACL)
C Code Reverse Shell
Compiling C Code
Restarting Machine
DLL Hijacking
Get PATH variable
Get all the environment variable
List all services running
DLL Code
Compiling DLL
Unquoted Service Path Attack
Finding Unquoted Service Path
Exploiting Unquoted Service Path
Task Scheduler
List all scheduled tasks
Service Commands
Start Service
Stop Service
Restarting Service
SeImpersonatePrivilege
Executing CMD commands using cmd as a command
Automated Tools
Tools to check for PE vector
/tmp equivalent in Windows machine
PowerShell writing to output
Last updated