Active Directory
Enumeration
Bloodhound
pip install bloodhound
bloodhound-python -u user -p pass -d domain -c AllPowerView
Set-ExecutionPolicy -ExecutionPolicy (RemoteSigned) or (Bypass). .\script.ps1 (be sure to include the space between ellipses)Basic enumeration (Powerview.ps1)
Get-Domain
Get-DomainPolicy
(Get-DomainPolicy).KerberosPolicy
Get-DomainController
Get-DomainUser -Identity student1
Get-NetUser -SPN (Kerberoastable users)
Get-NetUser -PreauthNotRequired (AS-REP Roastable users)
Get-DomainGroup
Get-DomainGroupMember -Identity "Domain Admins" -Recurse
Get-DomainComputer
Get-DomainComputer | select Name
Get-NetComputer -Unconstrained (unconstrained delegation **need to verify**)
Get-DomainUser
Get-DomainUser | select samaccountname
Get-DomainUser -SPN | select serviceprincipalname
Get-NetLoggedon -ComputerName name (requires local admin rights)
Get-DomainGPO
Get-DomainOU | select nameUser hunting
Last updated