Red Teaming And Windows Notes
  • Windows
    • Local Privilege Escalation
      • PRIVILEGES INFORMATION
      • Open Ports
      • Stored Creds
      • PowerShell/CMD History
      • Unquoted Service Paths
      • Evaluating Vulnerable Drivers
      • Printer
      • $PATH interception
    • Shell generators
    • Credentials Hunting.
      • Mimikatz
      • Secretsdump
      • Pypykatz
    • Active Directory
      • Quick Wins
      • Tools
      • Basic Recon
      • Laps Password Read
      • Weaponizing Windows
        • Weaponizing Windows Pt-1
      • Winrm Using Certificate[PFX]
      • WriteOwner
    • Powershell
    • Password Spray And Roasting
Powered by GitBook
On this page
  • Powerview
  • Domain/Computers Recon
  • Groups/Users Recon
  • Bloodhound
  • Collectors.
  1. Windows
  2. Active Directory

Basic Recon

Domain/Computers/Users/Groups Recon.

PreviousToolsNextLaps Password Read

Last updated 2 years ago

Powerview

Domain/Computers Recon

Get-Domain => Get Domain Information. Get-DomainPolicy => Get Domain Policy. (Get-DomainPolicy)."SystemAccess" => Password Policy. Get-DomainController => Get Domain Controller Information.

Get-NetComputer| select name => Get a list of computers in the current domain. Get-NetComputer -OperatingSystem "*Server 2016*" | select name ,operatingsystem |Format-List => OS info.

Groups/Users Recon

Get-NetGroup | select name => Get names of groups Get-NetGroup 'Group-Name' => All data about the specific group Get-NetGroupMember -MemberName "Group Name" -Recurse | select MemberName => Get all members of the domain admin group

Get-DomainUser => Get user's info about everything on the domain. Get-DomainUser | select cn => Get users name. Get-DomainUser -Identity <username> -Properties DisplayName, MemberOf,objectsid,useraccountcontrol | Format-List => Properties of a specific user.

Bloodhound

Collectors.

==> Invoke-BloodHound -CollectionMethod All ==> ./SharpHound.exe --CollectionMethod All ==> bloodhound-python -u support -p '#00^BlackKnight' -ns 10.10.10.192 -d blackfield.local -c all

Powershell Version
SharpHound
Python Bloodhound