In general, the commands used for these platforms would be similar to those used in real-world penetration testing and ethical hacking scenarios, such as:
- Network reconnaissance and scanning (e.g. nmap, ping, traceroute)
- Enumeration of services and vulnerabilities (e.g. dirb, gobuster, nikto)
- Exploitation of vulnerabilities (e.g. metasploit, exploitdb)
- Privilege escalation (e.g. linenum, unix-privesc-check)
- Post-exploitation tasks (e.g. powershell, nc, bash)
- Data exfiltration (e.g. ftp, scp, sftp)
Network reconnaissance and scanning:
nmap - a network scanner that can be used to identify open ports and services on a Windows machine.
netstat - a command-line utility that can be used to display active network connections and open ports on a Windows machine.
Enumeration of services and vulnerabilities:
dirb or dirbuster - a tool that can be used to brute-force directory and file names on a Windows machine.
powershell - a command-line shell and scripting language that can be used to enumerate system information, such as installed software and network configuration.
Exploitation of vulnerabilities:
metasploit - a popular framework for exploiting vulnerabilities in Windows and other systems.
exploitdb - a database of exploits that can be used to target specific vulnerabilities in Windows systems.
Privilege escalation:
linenum or unix-privesc-check - scripts that can be used to check for privilege escalation vectors on Linux systems, but there are similar tools like WinPEAS for Windows
mimikatz - a tool that can be used to extract credentials from Windows systems, which can be used for privilege escalation.
Post-exploitation tasks:
nc - a command-line utility that can be used to open reverse shells on Windows machines.
powershell - can also be used for post-exploitation tasks, such as creating backdoors and running keyloggers.
Data exfiltration:
ftp, scp, sftp - tools that can be used to exfiltrate data from Windows machines.
powershell - can also be used to exfiltrate data, such as through the use of web requests to upload data to a remote server.