1 - Manual Enumeration
Low Hanging Fruits
List local and domain users
net user
net user /domainBasically /domain queries the DC while w/o it queries the local machine
Check specific user:
net user jeffadmin
net user jeffadmin /domainList local and domain groups:
net localgroup
net group /domainCheck specifc group:
net localgroup "Sales Department"
net group "Sales Department" /domainBypass Script Execution Policy Scope
Set-ExecutionPolicy Bypass -Scope ProcessPowerview
Download here => https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1
Import module:
Get domain information:
Get all users:
Get all groups:
Get group members:
Get computers joined to the domain:
List domain joined computers where we have local admin access
List users connected to a specific machine:
Services Instances (SPNs)
List all SPNs for IIS
We can see a webserver running on the web04 machine.
List all SPN for all service accounts (requires powerview)
Get the IP of the machine the service instance is running on:
Objects ACL
What to look for:
Check our own user object ACL:
One ACL returned:
ActiveDirectoryRights: ReadPropertymeans a security principal has read access to our user objectSecurityIdentifieris the SID of the security principal that has the read permission on our object
We can translate the SID to something readable like that:
To get the ACL of a file for example:
List all security principa' SIDs that have full permission on the group specified:
We can bulk translate the SIDs to readable names:
Domain Shares
We find domain shares with Powerview:
This will return machine names and share names:
This is how we list the content of a share (we can cat, cd...):
Last updated