Post Exploitation Using WMIC (System Command)

https://www.hackingarticles.in/post-exploitation-using-wmic-system-command/