This document provides a cheat sheet for common Windows command line commands and tools such as reg, wmic, tasklist, netstat, and netsh. It summarizes how to use these tools to view and manage processes, services, the registry, network configuration and connections. Specific examples are given for tasks like adding registry keys, querying process and service information, searching for files, and installing packages on Windows Vista.
A banner is simply the text that is embedded with a message that is received from a host.
Usually this text includes signatures of applications that issue the message. So, they reveal themselves to us.
For more information about ethical hacking log on to http://www.arizonainfotech.com/
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows T.Rob Wyatt
The pipe symbol is your command-line friend. If you string together the right combination of utility programs it is possible to automate really useful administrative tasks, and if you can do it on one line you get to wear the Wizard's hat around the office as an added bonus. So whether you want to become a scripting wizard and impress your friends, or just want to get stuff done, this session is for you.
A banner is simply the text that is embedded with a message that is received from a host.
Usually this text includes signatures of applications that issue the message. So, they reveal themselves to us.
For more information about ethical hacking log on to http://www.arizonainfotech.com/
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows T.Rob Wyatt
The pipe symbol is your command-line friend. If you string together the right combination of utility programs it is possible to automate really useful administrative tasks, and if you can do it on one line you get to wear the Wizard's hat around the office as an added bonus. So whether you want to become a scripting wizard and impress your friends, or just want to get stuff done, this session is for you.
Slides for Building Better Backdoors with WMI - DerbyCon 2017 - Legacy
Code:
https://github.com/0xbadjuju/PowerProvider/
https://github.com/0xbadjuju/WheresMyImplant
This encompasses different techniques employed by leveraging powershell and attacking the systems in different ways. It is an interesting agglomeration of combined methods in plundering a windows box
A follow on to the Encyclopedia Of Windows Privilege Escalation published by InsomniaSec at Ruxcon 2011, this talk is aimed at detailing not just escalation from user to admin and admin to system, but persistence and forced authentication as well as a few other treats.
Docker Essentials Workshop— Innovation Labs July 2020CloudHero
This presentation was the foundation of our Docker Essentials workshop hosted by CloudHero CEO & founder Andrei Manea for the Innovation Labs team on the 23rd of July 2020.
This presentation covers the following topics:
-Getting started with containers
-A bit of history about orchestration
-Introduction to services (what they are, how to create and scale them).
To find out more about this topic, check https://cloudhero.io/
Introduction To Managing VMware With PowerShellHal Rottenberg
Introduction to the VI Toolkit which is available at http://vmware.com/go/powershell. Companion to my book which is at http://sapienpress.com/vmware.asp
Scaffolding for Serverless: lightning talk for AWS Arlington MeetupChris Shenton
Tools around a sample serverless app to automate the drudgery associated with a project. Testing with pytest and coverage; code smells with flake8; documentation with Sphinx for HTML/ePub output; different deployment environments based on code repo branch (dev, qa, prod, and per-developer); CI/CD pipeline to run all this, including deployment to separate AWS environments. And a simple app with API Gateway, Lambda, S3, DynamoDB.
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak PROIDEA
Speaker: Andrzej Dyjak
Language: English
In recent years security industry started to grow fond of Apple’s iOS and OS X platforms. This talk will cover one of XNU's flagship debugging utilities: DTrace, a dynamic tracing framework for troubleshooting kernel and application problems on production systems in real time. It will be shown how it can be used in order to ease various tasks within the realm of dynamic binary analysis and beyond.
CONFidence: http://confidence.org.pl/
PuppetConf 2016: The Challenges with Container Configuration – David Lutterko...Puppet
Here are the slides from David Lutterkort's PuppetConf 2016 presentation called The Challenges with Container Configuration. Watch the videos at https://www.youtube.com/playlist?list=PLV86BgbREluVjwwt-9UL8u2Uy8xnzpIqa
Introducing containers into your infrastructure brings new capabilities, but also new challenges, in particular around configuration. This talk will take a look under the hood at some of those operational challenges including:
* The difference between runtime and build-time configuration, and the importance of relating the two together.
* Configuration drift, immutable mental models and mutable container file systems.
* Who configures the orchestrators?
* Emergent vs. model driven configuration.
In the process we will identify some common problems and talk about potential solutions.
Talk from PuppetConf 2016
c bstatC nslookupDefault Server pdc.corp.example.comAdd.pdfannaelctronics
c:\ bstat
C:\\> nslookup
Default Server: pdc.corp.example.com
Address: 192.168.6.13
> server 10.255.255.255
Default Server: dns1.example.com
Address: 10.255.255.255
> set q=mx
> contoso.com.
At a command prompt, type Nslookup, and then press ENTER.
Type server , where IP address is the IP address of your external DNS server.
Type set q=MX, and then press ENTER.
Type , where domain name is the name of an external mail domain, and then press ENTER. The
mail exchanger (MX) resource record for the domain that you entered should be displayed. If the
MX record is not displayed, DNS is not configured to resolve external domain names.
Tracert a command-line utility that you can use to trace the path that an Internet Protocol (IP)
packet takes to its destination C;\\ tracert mediacollege.com Tracing a route to
mediacollege.comToolGeneral Job DescriptionExample CommandExample Specific
DescriptionHostnameHostname is the program that is used to either set or display the current
host, domain or node name of the system. These names are used by many of the networking
programs to identify the machine. The domain name is also used by NIS/YP.C:\\> hostnametype
hostname at the command prompt to see the hostnameIpconfigA console application that
displays all current TCP/IP network configuration values and can modify Dynamic Host
Configuration Protocol DHCP and Domain Name System DNS settings IPCONFIG /all
Display full configuration information Nbtstata diagnostic tool for NetBIOS over TCP/IP.Its
primary design is to help troubleshoot NetBIOS name resolution problems
c:\ bstatDisplay protocol statistics and current TCP/IP connections using NBTNetdiagNetdiag is
a set of pre-defined commands that can be used from the console of the K1000 that can be used
by support and customers to help troubleshoot issues regarding the appliance.netdiag [/q] [/v]
[/l] [/debug] [/d:DomainName] [/fix] [/DcAccountEnum] [/test:TestName] [/skip:TestName]
[/?]/q : Specifies quiet output and displays error only
/v : Specifies verbose output.
/l : Sends the output of the Netdiag results to a Netdiag.log file
/d:domain_name: Used to locate domain controllers in a specified domain
/fix:This parameter detects and correct issues with DNS.
/dcaccountenum: Enumerates the computer accounts of the domain controller
/test: TestName : Specific the test to perform. Types of available tests have been described
above.
/skip: testName : To skip any type of test.Netstata useful tool for checking your network
configuration and activity netstat -a list out all the current connectionsNslookupa network
administration tool for querying the Domain Name System (DNS) to obtain domain name or IP
address mapping or any other specific DNS record
C:\\> nslookup
Default Server: pdc.corp.example.com
Address: 192.168.6.13
> server 10.255.255.255
Default Server: dns1.example.com
Address: 10.255.255.255
> set q=mx
> contoso.com.
At a command prompt, type Nslookup, and then press ENTER.
Type server , where IP address is .
Get hands-on with security features and best practices to protect your containerized services. Learn to push and verify signed images with Docker Content Trust, and collaborate with delegation roles. Intermediate to advanced level Docker experience recommended, participants will be building and pushing with Docker during the workshop.
Led By Docker Security Experts:
Riyaz Faizullabhoy
David Lawrence
Viktor Stanchev
Experience Level: Intermediate to advanced level Docker experience recommended
Slides for Building Better Backdoors with WMI - DerbyCon 2017 - Legacy
Code:
https://github.com/0xbadjuju/PowerProvider/
https://github.com/0xbadjuju/WheresMyImplant
This encompasses different techniques employed by leveraging powershell and attacking the systems in different ways. It is an interesting agglomeration of combined methods in plundering a windows box
A follow on to the Encyclopedia Of Windows Privilege Escalation published by InsomniaSec at Ruxcon 2011, this talk is aimed at detailing not just escalation from user to admin and admin to system, but persistence and forced authentication as well as a few other treats.
Docker Essentials Workshop— Innovation Labs July 2020CloudHero
This presentation was the foundation of our Docker Essentials workshop hosted by CloudHero CEO & founder Andrei Manea for the Innovation Labs team on the 23rd of July 2020.
This presentation covers the following topics:
-Getting started with containers
-A bit of history about orchestration
-Introduction to services (what they are, how to create and scale them).
To find out more about this topic, check https://cloudhero.io/
Introduction To Managing VMware With PowerShellHal Rottenberg
Introduction to the VI Toolkit which is available at http://vmware.com/go/powershell. Companion to my book which is at http://sapienpress.com/vmware.asp
Scaffolding for Serverless: lightning talk for AWS Arlington MeetupChris Shenton
Tools around a sample serverless app to automate the drudgery associated with a project. Testing with pytest and coverage; code smells with flake8; documentation with Sphinx for HTML/ePub output; different deployment environments based on code repo branch (dev, qa, prod, and per-developer); CI/CD pipeline to run all this, including deployment to separate AWS environments. And a simple app with API Gateway, Lambda, S3, DynamoDB.
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak PROIDEA
Speaker: Andrzej Dyjak
Language: English
In recent years security industry started to grow fond of Apple’s iOS and OS X platforms. This talk will cover one of XNU's flagship debugging utilities: DTrace, a dynamic tracing framework for troubleshooting kernel and application problems on production systems in real time. It will be shown how it can be used in order to ease various tasks within the realm of dynamic binary analysis and beyond.
CONFidence: http://confidence.org.pl/
PuppetConf 2016: The Challenges with Container Configuration – David Lutterko...Puppet
Here are the slides from David Lutterkort's PuppetConf 2016 presentation called The Challenges with Container Configuration. Watch the videos at https://www.youtube.com/playlist?list=PLV86BgbREluVjwwt-9UL8u2Uy8xnzpIqa
Introducing containers into your infrastructure brings new capabilities, but also new challenges, in particular around configuration. This talk will take a look under the hood at some of those operational challenges including:
* The difference between runtime and build-time configuration, and the importance of relating the two together.
* Configuration drift, immutable mental models and mutable container file systems.
* Who configures the orchestrators?
* Emergent vs. model driven configuration.
In the process we will identify some common problems and talk about potential solutions.
Talk from PuppetConf 2016
c bstatC nslookupDefault Server pdc.corp.example.comAdd.pdfannaelctronics
c:\ bstat
C:\\> nslookup
Default Server: pdc.corp.example.com
Address: 192.168.6.13
> server 10.255.255.255
Default Server: dns1.example.com
Address: 10.255.255.255
> set q=mx
> contoso.com.
At a command prompt, type Nslookup, and then press ENTER.
Type server , where IP address is the IP address of your external DNS server.
Type set q=MX, and then press ENTER.
Type , where domain name is the name of an external mail domain, and then press ENTER. The
mail exchanger (MX) resource record for the domain that you entered should be displayed. If the
MX record is not displayed, DNS is not configured to resolve external domain names.
Tracert a command-line utility that you can use to trace the path that an Internet Protocol (IP)
packet takes to its destination C;\\ tracert mediacollege.com Tracing a route to
mediacollege.comToolGeneral Job DescriptionExample CommandExample Specific
DescriptionHostnameHostname is the program that is used to either set or display the current
host, domain or node name of the system. These names are used by many of the networking
programs to identify the machine. The domain name is also used by NIS/YP.C:\\> hostnametype
hostname at the command prompt to see the hostnameIpconfigA console application that
displays all current TCP/IP network configuration values and can modify Dynamic Host
Configuration Protocol DHCP and Domain Name System DNS settings IPCONFIG /all
Display full configuration information Nbtstata diagnostic tool for NetBIOS over TCP/IP.Its
primary design is to help troubleshoot NetBIOS name resolution problems
c:\ bstatDisplay protocol statistics and current TCP/IP connections using NBTNetdiagNetdiag is
a set of pre-defined commands that can be used from the console of the K1000 that can be used
by support and customers to help troubleshoot issues regarding the appliance.netdiag [/q] [/v]
[/l] [/debug] [/d:DomainName] [/fix] [/DcAccountEnum] [/test:TestName] [/skip:TestName]
[/?]/q : Specifies quiet output and displays error only
/v : Specifies verbose output.
/l : Sends the output of the Netdiag results to a Netdiag.log file
/d:domain_name: Used to locate domain controllers in a specified domain
/fix:This parameter detects and correct issues with DNS.
/dcaccountenum: Enumerates the computer accounts of the domain controller
/test: TestName : Specific the test to perform. Types of available tests have been described
above.
/skip: testName : To skip any type of test.Netstata useful tool for checking your network
configuration and activity netstat -a list out all the current connectionsNslookupa network
administration tool for querying the Domain Name System (DNS) to obtain domain name or IP
address mapping or any other specific DNS record
C:\\> nslookup
Default Server: pdc.corp.example.com
Address: 192.168.6.13
> server 10.255.255.255
Default Server: dns1.example.com
Address: 10.255.255.255
> set q=mx
> contoso.com.
At a command prompt, type Nslookup, and then press ENTER.
Type server , where IP address is .
Get hands-on with security features and best practices to protect your containerized services. Learn to push and verify signed images with Docker Content Trust, and collaborate with delegation roles. Intermediate to advanced level Docker experience recommended, participants will be building and pushing with Docker during the workshop.
Led By Docker Security Experts:
Riyaz Faizullabhoy
David Lawrence
Viktor Stanchev
Experience Level: Intermediate to advanced level Docker experience recommended
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Windows command line_sheet_v1
1. Reg Command WMIC Windows
Command Line
Adding Keys and Values: Fundamental grammar:
C:> reg add C:> wmic [alias] [where clause] [verb Cheat Sheet
[TargetIPaddr][RegDomain][Key] clause] By Ed Skoudis
POCKET REFERENCE GUIDE
Add a key to the registry on machine Useful [aliases]:
[TargetIPaddr] within the registry domain process service http://www.sans.org
[RegDomain] to location [Key]. If no remote share nicconfig
machine is specified, the current machine is startup useraccount Purpose
assumed. qfe (Quick Fix Engineering – shows patches) The purpose of this cheat sheet is to provide
tips on how to use various Windows
Export and Import: Example [where clauses]: command that are frequently referenced in
C:> reg export [RegDomain][Key] where name="nc.exe" SANS 504, 517, 531, and 560.
[FileName] where (commandline like "%stuff")
where (name="cmd.exe" and Process and Service Information
Export all subkeys and values located in the domain parentprocessid!="[pid]")
[RegDomain] under the location [Key] to the file List all processes currently running:
[FileName] Example [verb clauses]: C:> tasklist
list [full|brief]
C:> reg import [FileName] get [attrib1,attrib2…] List all processes currently running and the DLLs
call [method] each has loaded:
Import all registry entries from the file [FileName] delete C:> tasklist /m
Import and export can only be done from or to the List all attributes of [alias]: Lists all processes currently running which have the
local machine. C:> wmic [alias] get /? specified [dll] loaded:
C:> tasklist /m [dll]
Query for a specific Value of a Key: List all callable methods of [alias]:
C:> reg query C:> wmic [alias] call /? List all processes currently running and the services
[TargetIPaddr][RegDomain][Key] /v hosted in those processes:
[ValueName] Example: C:> tasklist /svc
List all attributes of all running processes:
Query a key on machine [TargetIPaddr] within C:> wmic process list full Query brief status of all services:
the registry domain [RegDomain] in location C:> sc query
[Key] and get the specific value [ValueName] Make WMIC effect remote [TargetIPaddr]:
under that key. Add /s to recurse all values. C:> wmic /node:[TargetIPaddr] Query the configuration of a specific service:
/user:[User] /password:[Passwd] process C:> sc qc [ServiceName]
list full
2. Shutdown and Restart File Search and Counting Lines Invoking Useful GUIs at the Command Line
Search directory structure for a file in a specific Local User Manager (includes group management):
Shutdown Windows immediately: C:> lusrmgr.msc
C:> shutdown /s /t 0 directory:
C:> dir /b /s [Directory][FileName]
Services Control Panel:
Note: Command may not power down the hardware. C:> services.msc
Count the number of lines on StandardOuy of
Restart Windows immediately: [Command]:
C:> [Command] | find /c /v "" Task Manager:
C:> shutdown /r /t 0 C:> taskmgr.exe
Abort shutdown/restart countdown: Finds the count (/c) of lines that do not contain (/v)
Security Policy Manager:
C:> shutdown /a nothing (""). Lines that do not have nothing are all C:> secpol.msc
lines, even blank lines, which contain CR/LF
Useful Netstat Syntax Event Viewer:
C:> eventvwr.msc
Show all TCP and UDP port usage and process ID: Command Line FOR Loops
C:> netstat –nao
Counting Loop: Control Panel:
C:> for /L %i in C:> control
Look for usage of port [port] every [N] seconds:
C:> netstat –nao [N] | find [port] ([start],[step],[stop]) do [command]
Close GUI windows by hitting Alt-F4
Dump detailed protocol statistics: Set %i to an initial value of [start] and increment Interacting with the Network Using Netsh
C:> netstat –s –p [tcp|udp|ip|icmp] it by [step] at every iteration until its value is equal
to [stop]. For each iteration, run [command]. The Turn off built-in Windows firewall:
Installing Built-in Packages on Vista iterator variable %i can be used anywhere in the C:> netsh firewall set opmode disable
command to represent its current value.
Install telnet service on Vista: Configure interface “Local Area Connection” with
C:> pkgmgr /iu:"TelnetServer" [IPaddr] [Netmask] [DefaultGW]:
Iterate over file contents:
C:> for /F %i in ([file-set]) do C:> netsh interface ip set address
Install telnet client on Vista: [command] local static [IPaddr] [Netmask]
C:> pkgmgr /iu:"TelnetClient" [DefaultGW] 1
Iterate through the contents of the file on a line-by-
Install IIS on Vista: Configure DNS server for “Local Area Connection”:
line basis. For each iteration, store the contents of
C:> pkgmgr /iu:IIS-WebServerRole;WAS- C:> netsh interface ip set dns local
the line into %i and run [command].
WindowsActivationService;WAS- static [IPaddr]
ProcessModel; WAS-NetFxEnvironment;WAS-
ConfigurationAPI Configure interface to use DHCP:
C:> netsh interface ip set address
To remove any of these packages, replace install
local dhcp
update (/iu) with uninstall update (/uu)