WMIC commands
Local
Gather domain DC and other information
wmic NTDOMAIN Get DomainControllerAddress,DomainName,RolesList all Users
wmic /NAMESPACE:\\root\directory\ldap PATH ds_user GET ds_samaccountnameGet all groups
wmic /NAMESPACE:\\root\directory\ldap PATH ds_group GET ds_samaccountnameGet members of the domain admin group
wmic path win32_groupuser where (groupcomponent="win32_group.name='domain admins',domain="DOMAIN'")list all computers
wmic /NAMESPACE:\\root\directory\ldap PATH ds_computer GET ds_samaccountnameComputer information
wmic computersystem list full Available volumes
wmic volume list brief find AV
wmic /namespace:\\root\securitycenter2 path antivirusproduct GET displayName, productState, pathToSignedProductExefind updates
find files with password in the name
get local use raccounts
WMI classes or information can also be accessed via Get-WmiObject in PowerShell. Some useful queries:
AV products
VM detection
find MSI not from MS
Logged on users
VMWARE detection
AD
We can enumerate remotely by adding /NODE:"<SERVER_NAME>" enumerating under other user context can be done adding /USER:"<DOMAIN>\<USER>" /PASSWORD:"<password>" ex:
enumerate groups:
user accounts
Group user memberships
Domain info
LDAP
Last updated
Was this helpful?