Windows forensic commands - Draft
Windows forensic commands - Draft
Network discovery:
Network Scan:
nbtstat -A IPaddress
for /L %I in (1,1,254) do ping -w 30 -n 1 192.168.1.%I | find "Reply" >> PingSweepResult.txt
nbtstat -c
for /L %I in (1,1,254) do nbtstat -An 192.168.1.%I
Network:
IP Statistics:
netstat -s
Firewall:
Enable the Windows Firewall specifically for the Public network profile
netsh advfirewall set publicprofile state on
Enable the Windows Firewall specifically for the Private network profile:
netsh advfirewall set privateprofile state on
Enable the Windows Firewall specifically for the Domain network profile:
netsh advfirewall set domainprofile state on
Create a rule in the Windows Firewall to allow incoming traffic on port 80 over TCP:
netsh advfirewall firewall add rule name="Open Port 80" dir=in action=allow protocol=TCP
localport=80
Add a custom firewall rule in Windows that allows incoming traffic for a specific application:
netsh advfirewall firewall add rule name="My Application" dir=in action=allow program="C:\
MyApp\MyApp.exe" enable=yes
Users:
Create user:
net user /add “username” “password”
Change password:
net user “username” “newpassword”
Use Windows Management Instrumentation to query and manage Remote Desktop settings:
wmic rdtoggle list
Services:
Display running services and applications along with their memory usage:
tasklist /fo table
start/stop service:
sc config "service name" start= disable
Display a detailed list of programs and services that run automatically at system startup:
wmic startup list full
Display registry values and settings stored under the specified key:
reg query "HKCU\Control Panel\Desktop"
Shadows files:
Display all the Volume Shadow Copies (VSS) that exist on the system:
vssadmin List Shadow
System info:
Display detailed configuration information about the operating system and the computer:
systeminfo
Query information about the domain that the computer is part of, in a brief format:
wmic ntdomain list brief
Miscellaneous:
Force reboot:
shutdown /r /f