Installed applications
MITRE ATT&CK™ Software Discovery - Technique T1518
Theory
Understanding the compromised machine's characteristics is essential. Enumerating installed applications aids in pinpointing vulnerabilities, obsolete software, and misconfiguration that may be leveraged for privilege escalation.
Practice
We may use following commands and query registries for installed applications
# Powershell
## 32-bit Apps
Get-ItemProperty "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*" | select displayname
## 64-Bit Apps
Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*" | select displayname
# CMD
## 32-bit Apps
REG QUERY "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" /s | findstr "DisplayName"
## 64-bit Apps
REG QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s | findstr "DisplayName"Using WMI, we can easily enumerate installed applications
# Powershell
Get-WmiObject -Class Win32_Product | Select-Object Name, Version
# CMD
wmic product get Name,VersionWe may check sub-folders of Program Files directories and content of the Downloads directory to find more potential programs
## 32-bit Apps
dir "C:\Program Files (x86)\"
## 64-bit Apps
dir "C:\Program Files"
## Hunt for more potential programs
dir "C:\Users\<your-user>\Downloads"Resources
Last updated
Was this helpful?