C:/>date.cmd
C:/>date /t
C:/>date
C:/>echo %date%
C:/>time /t
C:/>time
C:/>echo %time%
C:/>echo %date%-%time%
net session [\\<ComputerName>] [/delete] [/list]
net file [ID [/close]]
netstat [-a] [-b] [-e] [-n] [-o] [-p <Protocol>] [- r] [-s] [<interval>]
netstat -e –s
netstat -s -p tcp udp
Netstat –o 10
listdlls [-r] [-v | -u] [processname|pid] listdlls [-r] [-v] [-d dllname]
handle [[-a [-l]] [-v|-vt] [-u] | [-c <handle> [-y]] | [-s]] [-p <process>|<pid>] [name]
tasklist [/s <computer> [/u [<domain>][<username> [/p <password>]]]] [{/m <module> | /svc | /v}] [/fo {table | list | csv}] [/nh] [/fi <filter> [/fi <filter> [ ... ]]]
ipconfig [/allcompartments] [/all] [/renew [<adapter>]] [/release [<adapter>]] [/renew6[<adapter>]] [/release6 [<adapter>]] [/flushdns] [/displaydns] [/registerdns] [/showclassid <adapter>]
Ipconfig
Ipconfig /all
Ipconfig /renew Local Area Connection
Ipconfig /flishdns
Ipconfig /showclassid Local*
ipconfig /setclassid Local Area Connection TEST
PromiscDetect promiscdetect.exe
Promqry
Doskey [/history]
C:/>WINDOWS/system32>doskey /history
net share
net share list=“c:\photos list”
volatility.exe –f <imagefile> imageinfo
Volatility.exe –f <imgefile> --profile=<OS Profile> plist
Volatility.exe –f <imgefile> --profile=<OS Profile> pstree
Volatility.exe –f <imgefile> --profile=<OS Profile> malfind –p <Pid number>
dir [<drive>:][<path>][<filename>] [...] [/p] [/q] [/w] [/d] [/a[[:]<attributes>]][/o[[:]<sortorder>]] [/t[[:]<timefield>]] [/s] [/b] [/l] [/n] [/x] [/c] [/4] [/r]
dir /s/w/o/p/a:-d
lists the root directory, subdirectories, and files in the root directory, including extensionsdir /o:d
examine the date and time of the OS installationcontacts.edb
: stores contacts information in Microsoft live productsWLCalendarStore.edb
: stores calendar information in MWLMMail.MSMessageStore
: stores messages in MWLMWindows.edb
: stores index information by Win OSC:\Windows\SoftwareDistribution\DataStore \DataStore.edb
C:\ProgramData\Microsoft\Search\Data\Applications\Windows
devcon listclass <class> <port>
can display detailed information about devices on computers running Windows. You can also use DevCon to enable, disable, install, configure, and remove devices.https://github.com/ufrisk/MemProcFS
)MemProcFS.exe –device <path of memory dump file> -forensic 1
1: Leechagent.exe –remoteinstall <remote machine>
2: Memprocfs.exe –device <memory acquisition device> - remote <protocol>://<authentication>:<hostname> - remotefs –mount <drivename>