Domain Recon
Domain Recon (Powerview)
Use PowerView for domain enumeration
beacon> powershell-import C:\Tools\PowerSploit\Recon\PowerView.ps1Get Domain Information
beacon> powerpick Get-Domain -Domain <>Get Domain SID
beacon> powerpick Get-DomainSIDGet Domain Controller
beacon> powerpick Get-DomainController | select Forest, Name, OSVersion | flGet Forest Information
beacon> powerpick Get-ForestDomain -Forest <>Get Domain Policy
Get Domain users
Identify Kerberoastable/ASEPRoastable User/Uncontrained Delegation
Get Domain Computer
Identify Computer Accounts where unconstrained and constrained delefation is enabled
Get Domain OU
Identify computers in given OU
Get Domain group (Use -Recurse Flag)
Get Domain Group Member
Get Domain GPO
Find the System where given GPO are applicable
Idenitfy domain users/group who have local admin via Restricted group or GPO
Enumerates the machines where a specific domain user/group has local admin rights
Get Domain Trusts
Find Local Admin Access on other domain computers based on context of current user
SharpView binary
Domain Recon (ADSearch)
Kerberostable Users
ASEPROAST
Unconstrained Delegation
Constrained Delegation
Additionally, the --json parameter can be used to format the output in JSON
--json parameter can be used to format the output in JSONLast updated