githubEdit

Powerview cont.

Usage:

1) Get Current Domain:

Get-NetDomain

2) Enum Other Domains:

Get-NetDomain -Domain DOMAIN_NAME

3) Get Domain SID:

Get-DomainSID

4) Get Domain Policy:

Get-DomainPolicy

Will show us the policy configurations of the Domain about system access or kerberos

(Get-DomainPolicy)."system access"

(Get-DomainPolicy)."kerberos policy"

5) Get Domain Controlers:

6) Enumerate Domain Users:

Check last password change

Get a specific "string" on a user's attribute

Enumerate user logged on a machine

Enumerate Session Information for a machine

Enumerate domain machines of the current/specified domain where specific users

7) Enumerate Domain Computers:

Enumerate Live machines

8) Enumerate Groups and Group Members:

Enumerate the members of a specified group of the domain

Returns all GPOs in a domain that modify local group memberships through Restricted

9) Enumerate Shares

Enumerate Domain Shares

Enumerate Domain Shares the current user has access

10) Enumerate Group Policies

Shows active Policy on specified machine

Get users that are part of a Machine's local Admin group

11) Enumerate OUs

12) Enumerate ACLs

Returns the ACLs associated with the specified account

Search for interesting ACEs

Check the ACLs associated with a specified path (e.g smb share)

13) Enumerate Domain Trust

14) Enumerate Forest Trust

Domains of Forest Enumeration

Map the Trust of the Forest

15) User Hunting

Finds all machines on the current domain where the current user has local admin access

Find local admins on all machines of the domain:

Find computers were a Domain Admin OR a specified user has a session

Confirming admin access:

!!! Priv Esc to Domain Admin with User Hunting: I have local admin access on a machine -> A Domain Admin has a session on that machine - > I steal his token and impersonate him -> Profit!

Last updated