Vulnerability & Exploit Database

Back to search

Windows Gather Service Info Enumeration

This module will query the system for services and display name and configuration info for each returned service. It allows you to optionally search the credentials, path, or start type for a string and only return the results that match. These query operations are cumulative and if no query strings are specified, it just returns all services. NOTE: If the script hangs, windows firewall is most likely on and you did not migrate to a safe process (explorer.exe for example).

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

post/windows/gather/enum_services

Authors

  • Keith Faber
  • Kx499

Platforms

  • windows

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use post/windows/gather/enum_services msf post(enum_services) > sessions ...sessions... msf post(enum_services) > set SESSION <session-id> msf post(enum_services) > show options ...show and set options... msf post(enum_services) > run