Para descubrir dispositivos que esten en la misma interfaz nuestra, podemos usar PowerShell, creamos un archivo .ps1 con el siguiente contenido y ejecutamos:
arp -d
for /L %a in (1,1,254) do @start /b ping 192.168.20.%a -w 100 -n 2 >nul
arp -a
Computers
System info
systeminfo
netstat -a # See active connections (ports)
wmic qfe # Show us a list of installed and updated software
Remote Desktop
xfreerdp /v:IP /u:USER /p:PASSWORD
On hand commands
Get-WmiObject -Class win32_OperatingSystem Get information about the operating system
icacls <directory> View the permissions set on a directory
icacls c:\users /grant joe:f Grant a user full permissions to a directory
icacls c:\users /remove joe Remove a users' permissions on a directory
New-Alias -Name "Show-Files" Get-ChildItem Create a new PowerShell alias
Get-ExecutionPolicy -List View the PowerShell execution policy
Set-ExecutionPolicy Bypass -Scope Process Set the PowerShell execution policy to bypass for the current session
wmic os list brief Get information about the operating system with wmic
Get-MpComputerStatus Check which Defender protection settings are enabled
wmic useraccount get name,sid Show Name and SID from system users with wmic
Sysinternals tools
The SysInternals Tools suite is a set of portable Windows applications that can be used to administer Windows systems (for the most part without requiring installation). The tools can be either downloaded from the Microsoft website or by loading them directly from an internet-accessible file share by typing \\live.sysinternals.com\tools into a Windows Explorer window.