Using WMIC OS GET
for Windows Reconnaissance
The WMIC OS GET
command provides extensive information about the installed Windows operating system. Below is a curated list of commands and their purposes, updated for clarity and relevance. Each command can be useful during reconnaissance, privilege escalation, or vulnerability assessment tasks.
Command Format
WMIC OS GET \<COMMAND>
Key Commands
BootDevice
- Description: Name of the disk drive from which the OS starts.
- Use Case: Understand boot configurations and potential attack vectors.
BuildNumber
- Description: The build number of the operating system.
- Use Case: Assess system vulnerabilities and compatibility with exploits.
BuildType
- Description: The type of build used for the OS (e.g., checked or free).
- Use Case: Identify debugging capabilities and potential security features.
Caption
- Description: A short description of the OS, including its version.
- Use Case: Quick identification during reconnaissance.
CSDVersion
- Description: The latest service pack installed on the system.
- Use Case: Identify patch levels and potential vulnerabilities.
CSName
- Description: The name of the computer system.
- Use Case: Identify networked systems during penetration tests.
CurrentTimeZone
- Description: The time zone offset from Greenwich Mean Time (GMT).
- Use Case: Schedule attacks or analyze time-based vulnerabilities.
DataExecutionPrevention_32BitApplications
- Description: Indicates whether DEP is enabled for 32-bit applications.
- Use Case: Assess memory protection mechanisms.
DataExecutionPrevention_Available
- Description: Shows if DEP is available on the system.
- Use Case: Identify buffer overrun protections.
DataExecutionPrevention_Drivers
- Description: Indicates whether DEP is enabled for drivers.
- Use Case: Assess kernel-level security.
Debug
- Description: Identifies if the OS is a debug (checked) build.
- Use Case: Detect systems with enhanced debugging capabilities.
Description
- Description: General description of the OS.
- Use Case: Understand system attributes during reconnaissance.
EncryptionLevel
- Description: Indicates the encryption level for secure transactions.
- Use Case: Assess the strength of encryption protocols.
FreePhysicalMemory
- Description: Amount of free physical memory available.
- Use Case: Evaluate resource utilization and memory-based attack potential.
FreeSpaceInPagingFiles
- Description: Free space available in paging files.
- Use Case: Understand virtual memory usage for exploitation.
FreeVirtualMemory
- Description: Amount of free virtual memory available.
- Use Case: Assess resource utilization and potential attack vectors.
LastBootUpTime
- Description: The date and time of the last system boot.
- Use Case: Track system uptime and plan attack timings.
Locale
- Description: Language identifier of the OS.
- Use Case: Identify localized vulnerabilities.
Manufacturer
- Description: The manufacturer of the OS (e.g., Microsoft).
- Use Case: Pinpoint OEM-specific configurations.
NumberOfProcesses
- Description: The number of active processes on the system.
- Use Case: Detect anomalies and malicious activity.
NumberOfUsers
- Description: The number of active user sessions.
- Use Case: Assess system usage and unauthorized access potential.
OperatingSystemSKU
- Description: The SKU (Stock Keeping Unit) of the OS.
- Use Case: Understand edition-specific features or vulnerabilities.
Organization
- Description: The organization name registered to the OS.
- Use Case: Identify corporate configurations or attack targets.
OSArchitecture
- Description: The architecture of the OS (e.g., 32-bit, 64-bit).
- Use Case: Ensure compatibility with tools and exploits.
Version
- Description: The version number of the OS.
- Use Case: Identify known vulnerabilities for that version.