Lateral Movement with PowerView
Find existing local admin access for the current user:
Find-LocalAdminAccess
Hunt for sessions of interesting users on machines where you have access:
Find-DomainUserLocation -CheckAccess | ?{$_.LocalAdmin -Eq True }
Search for kerberoastable users:
Get-DomainUser -SPN | select name,serviceprincipalname
Search for AS-REP roastable users:
Get-DomainUser -PreauthNotRequired | select name
Look for interesting ACLs within the domain, filtering on a specific user or group you have compromised
Find-InterestingDomainAcl -ResolveGUIDs | ?{$_.IdentityReferenceName -match "UserOrGroupToQuery"}
Get-DomainComputer -Unconstrained
Get-DomainUser -TrustedToAuth | select userprincipalname,msds-allowedtodelegateto
Get-DomainComputer -TrustedToAuth | select name,msds-allowedtodelegateto
RFS (43)
Offshore NetworkTrain on real enterprise infrastructures with Hack The Box.
Offshore is a real-world enterprise environment that features a wide range of modern Active Directory flaws and misconfigurations.
Tagged in:
Active Directory, cyber red team training, Cyber Security, Keyword red team penetration testing, pen test red team, pen testing red team, pentesting red team, red team exercise examples, red team penetration testing, red team project management software
Subscribe to my newsletter
Read articles from PopLab Agency directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by