ShellSpells
  • 🧙‍♂️Welcome!
    • ShellSpells
    • FAQs
    • License & Disclaimer
  • 🐧Linux
    • System Ops
      • Transcripts
      • Help
      • System Info
        • Date/Time
        • System Details
        • Patches & Updates
        • Init System Identification
        • Hostname / Host ID
        • Variables
        • Hardware & Resources
      • Filesystem
        • Traverse & Enumerate
        • Drives & Partitions
        • Shares
        • Packages
        • Connected Devices
        • Kernel Modules (Drivers)
      • Users & Groups
        • Enumerate
        • Modify
      • Network
        • Enumerate
        • Modify
      • Scheduled Jobs
        • Enumerate
        • Modify
      • Processes
        • Enumerate
        • Modify
        • Custom Script and Shared Object
        • Process I/O Redirection
      • Services
        • Enumerate
        • Modify
        • Create a Service
      • Startup/Boot Scripts
        • Enumerate
        • Modify
      • Security
        • Antivirus
        • Firewall
        • SSH Keys
      • History & Logs
        • History
        • Logs
    • File Ops
      • Search
        • Filename
        • Content
        • Users (Owners)
        • Time
        • Size
        • Permission
        • Hidden Files
        • Inode
        • Find + Exec
        • Notes
      • Enumerate Metadata
      • Modify Metadata
      • Read Content
      • Modify Content
      • Extract Content
      • Sort / Compare / Count
      • Move
      • Copy
      • Execute
      • Hash
      • Encode/Decode
      • Compress/Decompress
      • Working With Weird Filenames
    • Terminal Ops
      • Keyboard Shortcuts
      • Tmux Shortcuts
  • 🪟Windows
    • System Ops
      • Transcripts
      • Help
      • System Info
        • One-liners
        • Date/Time
        • System Details
        • Hotfixes
        • Domain or Workgroup
        • Data Execution Prevention
        • Variables
        • Hardware & Resources
      • Filesystem
        • Traverse & Enumerate
        • Drives & Partitions
        • Installed Software
        • Drivers
        • Shares
      • Registry
        • Enumerate
        • Modify
        • Forensically Relevant Keys
      • Users & Groups
        • Enumerate
        • Modify
      • Network
        • Enumerate
        • Modify
      • Scheduled Tasks
      • Processes
        • Enumerate
        • Modify
      • Services
        • Enumerate
        • Modify
      • Autorun / Startup
        • Enumerate
        • Modify
      • Security
        • Permissions
          • Enumerate
          • Page
        • Antivirus
        • Firewall
          • Enumerate
          • Modify
        • Audit Policies
        • Remoting
          • Enumerate
          • Modify
          • Registry Locations
        • Stored Credentials
      • Remote Command Execution
      • Active Directory
        • Enumerate
        • Modify
      • History & Logs
        • History
        • Logs
      • PowerShell Config
      • Scripting
      • WMIC Notes
    • File Ops
      • Search
        • Filename
        • Time
        • Size
        • Permissions
        • Attributes
        • Wildcarding
      • Enumerate Metadata
        • One Liners
        • Users (Owners)
        • Timestamps
        • Size
        • Permissions
        • Attributes
      • Modify Metadata
        • Change Owner
        • Timestamps
        • Size
        • Attributes
      • Read Content
      • Modify Content
        • Overwrite
        • Insert
        • Append
        • Replace / Remove
        • Convert Case
        • Alternate Data Streams
      • Extract Content
      • Sort / Compare / Count
        • Sort
        • Count
        • Compare
      • Move
      • Copy
      • Execute
      • Hash
      • Encode/Decode
      • Compress/Decompress
      • Working With Weird Filenames
      • Output Formatting / Filtering
      • File Formatting
      • Operators
  • ⛓️Network
    • Traffic Manipulation
      • iptables
        • Option List
        • General Commands
        • Filter Tables
        • NAT
        • Mangle
        • Filter for SSH Traffic (Example)
      • nftables
    • Packet Capture
      • Syntax
      • TCPDump Examples
    • Packet Analysis
      • Wireshark
  • 🚗Maneuver
    • SSH
    • Control Sockets
    • RDP
    • Windows Port Proxy
  • 🛩️Data Transfer
    • SCP
    • FTP
    • Netcat
      • Netcat Relays
    • Server Interactions
    • Alternate Methods
  • 🪄REGEX
    • Examples
Powered by GitBook
On this page
  • Commands
  • GUI Commands and Locations
  • Registry Locations

Was this helpful?

  1. Windows
  2. System Ops
  3. System Info

System Details

Commands

systeminfo

Extensive system info

get-computerinfo

Extensive system info

ver

System version (CMD only)

net view

ServerName and Remarks of computers in your current domain

hostname

Hostname

net statistics

Options for statistics

net statistics Workstation

Uptime, and network statistics for workstation

wmic os get caption

OS Name

Get-CimInstance -ClassName Win32_ComputerSystem

General system info

Get-CimInstance -ClassName Win32_OperatingSystem

OS

Get-CimInstance -ClassName Win32_LogicalDisk

Logical disks

Get-CimInstance -ClassName Win32_NetworkAdapter

Network adapters

Get-CimInstance -ClassName Win32_Product

Installed software

Get-CimInstance -ClassName Win32_ComputerSystem | select name,domain | fl
Get-CimInstance -ClassName Win32_OperatingSystem | select SystemDirectory, BuildNumber, Version | fl

OS Name and Service Pack:

reg query "HKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion" 

Service Pack (Recursive):

reg query hklm /v CSDVersion /s

Service Pack Info:

wmic os get servicepackmajorversion

Shutdown time ? (System directory, shell error mode, CSDversion/CSDReleaseType)

reg.exe query HKLM\System\CurrentControlSet\Control\Windows

Show shell, default domain name, default user name, legal notice, etc.:

reg query "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"

GUI Commands and Locations

Run dialog: msinfo32

Opens system info in the GUI

System Control Panel:

Press Win + X and select "System". This provides basic system information like Windows edition, system type, etc.

Control Panel:

Navigate to Control Panel > System and Security > System. This provides basic information about your computer.

Task Manager:

Open Task Manager (Ctrl + Shift + Esc) and navigate to the Performance tab to view CPU, memory, disk, and network usage.

Device Manager:

Open Device Manager by pressing Win + X and selecting "Device Manager". This allows you to view and manage hardware devices.

Open the Run dialog (Win + R) and type dxdiag. This provides information about DirectX components and system information.

Registry Locations

HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System

Contains detailed system hardware information.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion

Stores Windows version, build, product name, and installation information.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SystemInformation

Holds system manufacturer, model, and type information.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum

Enumerates all hardware devices and their configuration.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services

Lists all system services and their configurations.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion

Contains various Windows settings, including installed software and system policies.

PreviousDate/TimeNextHotfixes

Last updated 1 year ago

Was this helpful?

🪟