Check Who You Are
echo %USERDOMAIN%\%USERNAME whoami |
Check Windows Version
systeminfo | findstr /B /C:"OS Name" /C:"OS Version" |
Add a User
net user <username> <password> /add</password></username> |
Ramblings of a NetSec addict
Check Who You Are
echo %USERDOMAIN%\%USERNAME whoami |
echo %USERDOMAIN%\%USERNAME whoami
Check Windows Version
systeminfo | findstr /B /C:"OS Name" /C:"OS Version" |
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Add a User
net user <username> <password> /add</password></username> |
net user <username> <password> /add</password></username>
The windows passwords can be accessed in a number of different ways. The most common way would be via accessing the Security Accounts Manager (SAM) file and obtaining the system passwords in their hashed form with a number of different tools. Alternatively passwords can be read from memory which has the added benefit of recovering the passwords in plain text and avoiding the cracking requirement. In order to understand the formats you’ll see when dumping Windows system hashes a brief overview of the different storage formats is required.
[Read more…]