Windows common commands enum
When attackers initially gain access to a machine, they are known to run the following commands in a short period of time :
After doing this, attackers then perform Recon on the wider environment using these commands :
After they have gained a foothold in a network and want to spread, they commonly use these commands :
PreviousMonitor connected remote clients for activity and statusNextCommands Group policy updating an checking status
Last updated