2 min read

WMIC OS GET

WMIC - One of the best windows command line tools that you've never used.

Updated Feb 2024

WMIC OS GET provides a wealth of information about the installed Windows operating system. As I listed several of these in my previous post on Windows privilege escalation, I thought that I would expand and provide a list of all commands I find to be relevant. Information taken from the MSDN

Format is: WMIC OS GET boldcommand

  • BootDevice: Name of the disk drive from which the Windows operating system starts.
    Useful for understanding boot configurations and potential attack vectors.

  • BuildNumber: Obtain the build number of the operating system for precise version identification.
    Helps in assessing system vulnerabilities and compatibility with exploits.

  • BuildType: Determine the type of build used for the operating system.
    Valuable for understanding the level of security features and debugging capabilities.

  • Caption: Get a short description of the operating system, including version information.
    Useful for quick identification during reconnaissance.

  • CSDVersion: Check the latest service pack installed on the system.
    Helps in identifying potential vulnerabilities and patch levels.

  • CSName: Obtain the name of the computer system.
    Useful for identifying networked systems during pentests.

  • CurrentTimeZone: Get the time zone offset from Greenwich Mean Time (GMT).
    Helpful for scheduling attacks and understanding time-based vulnerabilities.

  • DataExecutionPrevention_32BitApplications: Check if data execution prevention is enabled for 32-bit applications.
    Useful for assessing memory protection mechanisms.

  • DataExecutionPrevention__Available: Determine if data execution prevention is available.
    Indicates the presence of buffer overrun protection.

  • DataExecutionPrevention_Drivers: Check if data execution prevention is enabled for drivers.
    Important for assessing kernel-level security.

  • Debug: Identify if the operating system is a checked (debug) build.
    Useful for identifying systems with additional debugging capabilities.

  • Description: Obtain a description of the Windows operating system.
    Helps in understanding system attributes during reconnaissance.

  • EncryptionLevel: Determine the encryption level for secure transactions.
    Useful for assessing the strength of encryption protocols.

  • FreePhysicalMemory: Check the amount of free physical memory available.
    Helps in assessing system resource utilization and potential memory-based attacks.

  • FreeSpaceInPagingFiles: Get the amount of free space in paging files.
    Useful for understanding virtual memory usage and potential file-based attacks.

  • FreeVirtualMemory: Check the amount of free virtual memory available.
    Helps in assessing system resource utilization and potential memory-based attacks.

  • LastBootUpTime: Obtain the date and time of the last system boot.
    Useful for tracking system uptime and scheduling attacks during low-activity periods.

  • Locale: Get the language identifier used by the operating system.
    Helpful for identifying localized vulnerabilities and language-specific attack vectors.

  • Manufacturer: Identify the manufacturer of the operating system.
    Useful for identifying OEM-specific configurations and vulnerabilities.

  • NumberOfProcesses: Determine the number of active processes on the system.
    Helpful for identifying suspicious or malicious processes during intrusion detection.

  • NumberOfUsers: Obtain the number of active user sessions on the system.
    Useful for assessing system usage and potential unauthorized access.

  • OperatingSystemSKU: Identify the Stock Keeping Unit (SKU) number for the operating system.
    Helps in understanding licensing and edition-specific vulnerabilities.

  • Organization: Obtain the organization name for the registered user of the operating system.
    Useful for identifying corporate configurations and potential attack targets.

  • OSArchitecture: Determine the architecture of the operating system.
    Helpful for identifying compatibility issues and selecting appropriate exploits.

  • Version: Obtain the version number of the operating system.
    Useful for identifying known vulnerabilities and compatibility with exploits.