WMIC commands

Local

Gather domain DC and other information

wmic NTDOMAIN Get DomainControllerAddress,DomainName,Roles

List all Users

wmic /NAMESPACE:\\root\directory\ldap PATH ds_user GET ds_samaccountname

Get all groups

wmic /NAMESPACE:\\root\directory\ldap PATH ds_group GET ds_samaccountname

Get members of the domain admin group

wmic path win32_groupuser where (groupcomponent="win32_group.name='domain admins',domain="DOMAIN'")

list all computers

wmic /NAMESPACE:\\root\directory\ldap PATH ds_computer GET ds_samaccountname

Computer information

wmic computersystem list full 

Available volumes

wmic volume list brief 

find AV

wmic /namespace:\\root\securitycenter2 path antivirusproduct GET displayName,  productState, pathToSignedProductExe

find updates

find files with password in the name

get local use raccounts

WMI classes or information can also be accessed via Get-WmiObject in PowerShell. Some useful queries:

AV products

VM detection

find MSI not from MS

Logged on users

VMWARE detection

AD

We can enumerate remotely by adding /NODE:"<SERVER_NAME>" enumerating under other user context can be done adding /USER:"<DOMAIN>\<USER>" /PASSWORD:"<password>" ex:

enumerate groups:

user accounts

Group user memberships

Domain info

LDAP

Last updated

Was this helpful?