0 votes
in Hacking by

1.0             Method execution:

NICCONFIG (Win32_NetworkAdapterConfiguration)

WMIC NICCONFIG WHERE Index=1 CALL EnableStatic ("10.0.0.2"),("255.0.0.0")

WMIC NICCONFIG WHERE Index=1 CALL SetGateways ("10.0.0.8","10.0.0.9"),(1,2)

WMIC NICCONFIG WHERE Index=1 CALL EnableDHCP

Service (Win32_Service)

WMIC SERVICE WHERE Caption="SSDP Discovery Service" CALL ChangeStartMode "Disabled"

WMIC SERVICE WHERE Name="WebrootCommAgentService" CALL startservice

Datafile (CIM_DataFile)

WMIC DATAFILE WHERE "path='\\windows\\system32\\wbem\\' AND Extension='mof' or path='\\windows\\system32\\wbem\\' AND Extension='pdb'" CALL "Compress"

OS (Win32_OperatingSystem)

WMIC /NODE:@"c:\MyServerList.txt" OS WHERE (Primary="TRUE" AND Locale!="0411" AND Organization!="Organization1") CALL Win32ShutDown 6

WMIC OS WHERE Primary=1 CALL Shutdown

PROCESS (Win32_Process)

WMIC PROCESS CALL Create "calc.exe"

WMIC PROCESS WHERE Name="calc.exe" CALL Terminate

WMIC PROCESS WHERE Name="explorer.exe" call SetPriority 64

Identical to: 

WMIC PATH Win32_Process WHERE Name="explorer.exe" call SetPriority 64

RDTOGGLE (Remote Desktop)

RDTOGGLE WHERE ServerName="computer1.microsoft.com" call SetAllowTSConnections 0

1.0             Data collection:

WMIC logicaldisk WHERE drivetype=3 GET name,freespace,SystemName,FileSystem,Size,VolumeSerialNumber

WMIC PATH CIM_DataFile WHERE "Path='\\windows\\system32\\wbem\\' AND FileSize>1784088"

WMIC NTEVENT WHERE SourceName="winmgmt" GET Message,EvenTtype /FORMAT:HTABLE > c:\winmgmtevents.htm

WMIC NTEVENT WHERE "EventType<3 AND LogFile!='System' AND LogFile!='Security'" GET LogFile,SourceName,EventType,Message,TimeGenerated /FORMAT:"htable.xsl":"datatype=number":"sortby=EventType" > c:\appevent.htm

WMIC /NAMESPACE:\\root\directory\ldap PATH ds_user WHERE GET ds_displayName,DS_UserPrincipalName,ds_cn,ds_name,ds_whenCreated /VALUE

WMIC PATH CIM_Controller GET Name,Status,SystemName,ProtocolSupported

2.0             Data display:

WMIC PROCESS WHERE "name like '%HOST%'"

WMIC PATH Win32_Process WHERE "name like '%HOST%'"

WMIC PROCESS WHERE “Name=svchost.exe” LIST Statistics

WMIC PROCESS WHERE “Name=svchost.exe” LIST BrieF

WMIC PROCESS WHERE (Name='svchost.exe') GET name, processid

WMIC PROCESS WHERE “Name=svchost.exe” GET name,processid /VALUE

WMIC PROCESS GET /FORMAT:htable

WMIC PROCESS GET /FORMAT:”c:\windows\system32\wbem\htable.xsl” 

WMIC PROCESS GET /FORMAT:hform 

WMIC PROCESS GET /FORMAT:csv

4.0      Data output:

WMIC BIOS > mydata.txt

WMIC OS >> mydata.txt

WMIC /APPEND:mydata.txt PAGEFILE

WMIC /OUTPUT:output.txt OS

WMIC /OUTPUT:CLIPBOARD BIOS

3.0             Data creation:

WMIC /NAMESPACE:\\root\default PATH __Namespace CREATE Name=test

4.0             Data deletion:

WMIC /NAMESPACE:\\root\default PATH __Namespace WHERE Name="test" DELETE

WMIC /NAMESPACE:\\root\subscription PATH __EventFilter WHERE __CLASS="__EventFilter" DELETE

5.0             Security and connection:

Delegate authority

WMIC /node:"computer1" /IMPLEVEL:Delegate /AUTHORITY:"Kerberos:domain\computer1" OS

WMIC /NODE:"computer1.domainofcomputer1.org" /AUTHLEVEL:Pktprivacy BIOS

6.0             Batch scripting:

WMIC.EXE /OUTPUT:WMICLASSES.txt /NAMESPACE:\\root\wmi PATH WDMClassesOfDriver GET Classname

for /f "usebackq skip=1" %%I in (`type WMICLASSES.txt`) DO WMIC.exe /namespace:\\root\wmi PATH %%I

WMIC PROCESS GET /FORMAT:"%windir%\system32\wbem\csv.xsl" >> c:\1.csv

Please log in or register to answer this question.

Welcome to My QtoA, where you can ask questions and receive answers from other members of the community.
...