Exploiting Native AD Techniques for Security
Проект предоставляет обширную коллекцию методов, команд и функций
Некоторые примеры:
# Collect Domain SID
Get-ADDomain | Select-Object SID
# Users with Delegation Privileges
Get-ADUser -Filter {TrustedForDelegation -eq $true}
# Get Domain Users Last Logon Time
Get-ADUser -Filter * -Properties LastLogonDate | Select Name, LastLogonDate
# List Users in Specific Group
Get-ADGroupMember -Identity "Domain Admins" | Select-Object Name, SamAccountName
# List Service Principal Names (SPNs)
Get-ADUser -Filter {ServicePrincipalName -ne "$null"} | Select-Object Name, ServicePrincipalName
# Check for Kerberos Pre-Authentication Disabled Accounts
Get-ADUser -Filter {DoesNotRequirePreAuth -eq $true} | Select Name, SamAccountName
#lolad #redteam #ad #windows
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥8❤5👍3🙊1