PowerView
Enumeration
# Domain information
Get-Domain
# Domain SID
Get-DomainSID
# DC info
Get-DomainController# Domain policies
Get-DomainPolicyData# List the specified attributes of all domain users
Get-DomainUser | select samaccountname
# Query about a specified user
Get-DomainUser -Identity ca_svc
# Search for a particular string in a user's attribute
Get-DomainUser -LDAPFilter "Description=*built*" | select name,description# Filter by logonCount
Get-DomainUser | select samaccountname,logonCount
# Enumerate honeypot accounts
Get-DomainUser | Where-Object {$_.logoncount -eq 0}
# Discard honeypot accounts
Get-DomainUser | Where-Object {$_.logoncount -gt 0}
# List domain GPOs
Get-DomainGPO | select displayname
Get-DomainGPO -Identity <host>
# GPOs which use Restricted Groups or groups.xml for interesting users
Get-DomainGPOLocalGroup
# Users which are in a local group of a host using GPO
Get-DomainGPOComputerLocalGroupMapping -ComputerIdentity <host>
# Machines where the given user is member of a specific group
Get-DomainGPOUserLocalGroupMapping -Identity user# List domain OUs
Get-DomainOU# Find the gplink attribute
Get-NetOU
(Get-DomainOu -Identity DevOps).gplink
[LDAP://cn={0BF8D01C-1F62-4BDC-958C-57140B67D147},cn=policies,cn=system,DC=dollarcorp,DC=moneycorp,DC=local;0]
# Find the name corresponding to the gplink
Get-DomainGPO -Identity "{0BF8D01C-1F62-4BDC-958C-57140B67D147}"
displayname : DevOps Policy
# List hosts members of the OU
(Get-DomainOU -Identity DevOps).distinguishedname | %{Get-DomainComputer -SearchBase $_} | select nameAttacks
Kerberoasting
Password Change
LAPS Password
Python Version
Last updated