Para descubrir dispositivos que esten en la misma interfaz nuestra, podemos usar PowerShell, creamos un archivo .ps1 con el siguiente contenido y ejecutamos:
arp -dfor/L %a in (1,1,254) do @start /b ping 192.168.20.%a -w 100-n 2>nularp -a
Computers
System info
systeminfonetstat -a # See active connections (ports)wmic qfe # Show us a list of installed and updated software
Remote Desktop
xfreerdp/v:IP/u:USER/p:PASSWORD
On hand commands
Get-WmiObject-Class win32_OperatingSystem Get information about the operating systemicacls <directory> View the permissions set on a directoryicacls c:\users /grant joe:f Grant a user full permissions to a directoryicacls c:\users /remove joe Remove a users' permissions on a directoryNew-Alias -Name "Show-Files" Get-ChildItem Create a new PowerShell aliasGet-ExecutionPolicy -List View the PowerShell execution policySet-ExecutionPolicy Bypass -Scope Process Set the PowerShell execution policy to bypass for the current sessionwmic os list brief Get information about the operating system with wmicGet-MpComputerStatus Check which Defender protection settings are enabledwmic useraccount get name,sid Show Name and SID from system users with wmic
Sysinternals tools
The SysInternals Tools suite is a set of portable Windows applications that can be used to administer Windows systems (for the most part without requiring installation). The tools can be either downloaded from the Microsoft website or by loading them directly from an internet-accessible file share by typing \\live.sysinternals.com\tools into a Windows Explorer window.