Enumeration
ABOUT
In any situation, whether daily life or a network penetration test, understanding our surroundings is crucial. This awareness allows us to make informed, proactive decisions. We may discover accessible hosts, protections to bypass, or tools incompatible with the target system.
Data Sources
Installed applications
Installed services
Websites
File Shares
Databases
Directory Services (such as Active Directory, Azure AD, etc.)
Name Servers
Deployment Services
Certificate Authority
Source Code Management Server
Virtualization
Messaging
Monitoring and Logging Systems
Backups
Sensitive Data
Keylogging
Screen Capture
Network Traffic Capture
Previous Audit reports
User Information
History files, interesting documents (.doc/x,.xls/x,password./pass., etc)
Roles and Privileges
Web Browsers
IM Clients
NETWORK
Display network connections:
Network Configs
ARP Table
Routing Table
USERS / GROUPS
Check logged-in users:
View current user context:
View current user privileges:
View current user group memberships:
List all users on the system:
List all groups on the system:
Get details of a specific group:
View password policy and account settings:
Check Local User Description Field
PROCESSES / SERVICES
View running processes and services:
View service by PID
Get service by name
SYSTEM
Display environment variables:
Gather system info
Checking Build Info
Checking UAC
Check Computer Description Field
PERMISSIONS
Check privileges
Check Group Policies
PROGRAMS
List installed programs:
View patches and updates:
PROTECTIONS
Defender Status
List AppLocker Rules
Test AppLocker Policy
NAMED PIPES
Listing Named Pipes
Reviewing LSASS Named Pipe Permissions
SCHEDULED TASKS
FILES
Get more info about file
Files of Interest
File
Explanation
C:\Windows\System32\config\SAM
Stores user account information.
C:\Windows\System32\config\system
Contains system startup settings and driver configurations.
C:\Windows\System32\config\software
Contains software installation and configuration data.
C:\Windows\System32\config\security
Stores security settings and permissions.
C:\Windows\System32\config\default
Contains default user profile settings.
C:\Windows\System32\config\RegBack
Backup registry files for system recovery.
%WINDIR%\win.ini
Contains system settings for Windows.
%WINDIR%\system32\config\txr\{guid}\*.log
Logs of file system changes.
C:\Windows\System32\winevt\Logs\Security.evtx
Security event log with information about logins and security events.
%APPDATA%\Microsoft\Windows\Recent
Contains shortcuts to recently opened files.
%SYSTEMDRIVE%\$Recycle.Bin
Stores deleted files that can be recovered.
C:\Users\<username>\AppData\Local\Temp
Temporary files that may contain sensitive data or tools.
C:\Windows\System32\drivers\etc\hosts
Maps IP addresses to hostnames, useful for detecting malicious redirections.
%WINDIR%\System32\drivers\etc\networks
Contains system network interface configurations.
C:\Windows\System32\config\hivelist
Backup of the registry hives, useful for recovery or data extraction.
C:\Windows\System32\config\software.log
Tracks changes to software configurations.
C:\inetpub\wwwroot\web.config
Configures IIS web apps, may contain sensitive data like connection strings or settings.
Last updated