PowerView
Powerview
Powerview is a powerful powershell script from powershell empire that can be used for enumerating a domain after you have already gained a shell in the system.
Start Powershell -
powershell -ep bypass
-ep bypasses
the execution policy of powershell allowing you to easily run scriptsTransfer PowerView to the target box (see file transfers page)
Start PowerView
Load into Memory
Host remotely
See system info
Enumerate the domain users
Enumerate the domain groups
See shared folders
See Full network information
See the operating systems running
Get all the groups a user is effectively a member of, 'recursing up' using tokenGroups
Get all the effective members of a group, 'recursing down'
Use an alterate creadential for any function
Get GPO Display Name
Retrieve all the computer dns host names a GPP password applies to
Get all users with passwords changed > 1 year ago, returning sam account names and password last set times
All enabled users, returning distinguishednames
All disabled users
All users that require smart card authentication
All users that don't require smart card authentication, only returning sam account names
Use multiple identity types for any -Domain function
Find all users with an SPN set (likely service accounts)
Check for users who don't have kerberos preauthentication set
Find all service accounts in "Domain Admins"
Find users with sidHistory set
Find any users/computers with constrained delegation st
Enumerate all servers that allow unconstrained delegation, and all privileged users that aren't marked as sensitive/not for delegation
Return the local groups of a remote server
Return the local group members of a remote server using Win32 API methods (faster but less info)
Kerberoast any users in a particular OU with SPNs set
Enumerate servers that allow unconstrained Kerberos delegation and show all users logged in
Hunt for admin users that allow delegation, logged into servers that allow unconstrained delegation
Find all computers in a given OU
Get the logged on users for all machines in any server OU in a particular domain
Enumerate all gobal catalogs in the forest
Turn a list of computer short names to FQDNs, using a global catalog
Enumerate the current domain controller policy
Enumerate the current domain policy
Enumerate what machines that a particular user/group identity has local admin rights to
Enumerate what machines that a given user in the specified domain has RDP access rights to
Export a csv of all GPO mappings
Use alternate credentials for searching for files on the domain
Find-InterestingDomainShareFile == old Invoke-FileFinder
Enumerate who has rights to the 'matt' user in 'testlab.local', resolving rights GUIDs to names
Grant user 'will' the rights to change 'matt's password
Audit the permissions of AdminSDHolder, resolving GUIDs
Backdoor the ACLs of all privileged accounts with the 'matt' account through AdminSDHolder abuse
Retrieve most users who can perform DC replication for dev.testlab.local (i.e. DCsync)
Find linked DA accounts using name correlation
Save a PowerView object to disk for later usage
Find any machine accounts in privileged groups
Enumerate permissions for GPOs where users with RIDs of > -1000 have some kind of modification/control rights
Find all policies applied to a current machine
Enumerate all groups in a domain that don't have a global scope, returning just group names
Enumerate all foreign users in the global catalog, and query the specified domain localgroups for their memberships
Query the global catalog for foreign security principals with domain-based SIDs, and extract out all distinguishednames
If running in -sta mode, impersonate another credential a la "runas /netonly"
Enumerates computers in the current domain with 'outlier' properties, i.e. properties not set from the firest result returned by Get-DomainComputer
Set the specified property for the given user identity
Set the owner of 'dfm' in the current domain to 'harmj0y'
Retrieve most users who can perform DC replication for dev.testlab.local (i.e. DCsync)
Check if any user passwords are set
Last updated