Understanding the compromised machine's characteristics is essential. Enumerating installed applications aids in pinpointing vulnerabilities, obsolete software, and misconfiguration that may be leveraged for privilege escalation.
Practice
Applications retrieved from registries or WMI may not be complete. We should always check 32-bit and 64-bit Program Files directories and content of the Downloads directory of our user to find more potential programs.
We may use following commands and query registries for installed applications
Using WMI, we can easily enumerate installed applications
# Powershell
Get-WmiObject -Class Win32_Product | Select-Object Name, Version
# CMD
wmic product get Name,Version
We may check sub-folders of Program Files directories and content of the Downloads directory to find more potential programs
## 32-bit Apps
dir "C:\Program Files (x86)\"
## 64-bit Apps
dir "C:\Program Files"
## Hunt for more potential programs
dir "C:\Users\<your-user>\Downloads"