githubEdit

Domain Recon

Domain Recon (Powerview)

Use PowerView for domain enumeration

beacon> powershell-import C:\Tools\PowerSploit\Recon\PowerView.ps1

Get Domain Information

beacon> powerpick Get-Domain -Domain <>

Get Domain SID

beacon> powerpick Get-DomainSID

Get Domain Controller

beacon> powerpick Get-DomainController | select Forest, Name, OSVersion | fl

Get Forest Information

beacon> powerpick Get-ForestDomain -Forest <>

Get Domain Policy

Get Domain users

Identify Kerberoastable/ASEPRoastable User/Uncontrained Delegation

Get Domain Computer

Identify Computer Accounts where unconstrained and constrained delefation is enabled

Get Domain OU

Identify computers in given OU

Get Domain group (Use -Recurse Flag)

Get Domain Group Member

Get Domain GPO

Find the System where given GPO are applicable

Idenitfy domain users/group who have local admin via Restricted group or GPO

Enumerates the machines where a specific domain user/group has local admin rights

Get Domain Trusts

Find Local Admin Access on other domain computers based on context of current user

SharpView binary

Domain Recon (ADSearch)

Kerberostable Users

ASEPROAST

Unconstrained Delegation

Constrained Delegation

Additionally, the --json parameter can be used to format the output in JSON

Last updated