You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
--admin-count Get user that had the value adminCount=1
136
+
--users [USERS ...] Enumerate domain users
137
+
--users-export USERS_EXPORT
138
+
Enumerate domain users and export them to the specified file
139
+
--groups [GROUPS] Enumerate domain groups, if a group is specified than its members are enumerated
140
+
--computers Enumerate domain computers
134
141
--dc-list Enumerate Domain Controllers
135
142
--get-sid Get domain sid
136
143
--active-users [ACTIVE_USERS ...]
137
144
Get Active Domain Users Accounts
145
+
--pso Get Fine Grained Password Policy/PSOs
146
+
--pass-pol Dump password policy
138
147
139
148
Retrieve gmsa on the remote DC:
140
149
Options to play with gmsa
@@ -149,33 +158,44 @@ Bloodhound Scan:
149
158
Options to play with Bloodhoud
150
159
151
160
--bloodhound Perform a Bloodhound scan
152
-
-c COLLECTION, --collection COLLECTION
153
-
Which information to collect. Supported: Group, LocalAdmin, Session, Trusts, Default, DCOnly, DCOM, RDP, PSRemote, LoggedOn, Container, ObjectProps, ACL, All. You can specify more than one by separating them
154
-
with a comma (default: Default)
161
+
-c, --collection COLLECTION
162
+
Which information to collect. Supported: Group, LocalAdmin, Session, Trusts, Default, DCOnly, DCOM, RDP, PSRemote, LoggedOn, Container, ObjectProps, ACL, All. You can specify more than one by
163
+
separating them with a comma (default: Default)
155
164
```
156
165
157
-
## Modules
166
+
## Low Privilege Modules
158
167
159
168
```plain
160
-
LOW PRIVILEGE MODULES
169
+
ENUMERATION
161
170
[*] adcs Find PKI Enrollment Services in Active Directory and Certificate Templates Names
171
+
[*] badsuccessor Check if vulnerable to bad successor attack (DMSA)
172
+
[*] certipy-find certipy find command with options to export the result to text/csv/json. Default: Show only vulnerable templates
162
173
[*] daclread Read and backup the Discretionary Access Control List of objects. Be careful, this module cannot read the DACLS recursively, see more explanation in the options.
163
-
[*] enum_trusts Extract all Trust Relationships, Trusting Direction, and Trust Transitivity
174
+
[*] dump-computers Dumps all computers in the domain
175
+
[*] entra-id Find the Entra ID sync server
176
+
[*] enum_trusts [REMOVED] Extract all Trust Relationships, Trusting Direction, and Trust Transitivity
164
177
[*] find-computer Finds computers in the domain via the provided text
165
-
[*] get-desc-users Get description of the users. May contained password
166
178
[*] get-network Query all DNS records with the corresponding IP from the domain.
167
-
[*] get-unixUserPassword Get unixUserPassword attribute from all users in ldap
168
-
[*] get-userPassword Get userPassword attribute from all users in ldap
169
-
[*] group-mem Retrieves all the members within a Group
179
+
[*] group-mem [REMOVED] Retrieves all the members within a Group
170
180
[*] groupmembership Query the groups to which a user belongs.
171
-
[*] laps Retrieves all LAPS passwords which the account has read permissions for.
172
-
[*] ldap-checker Checks whether LDAP signing and binding are required and / or enforced
181
+
[*] ldap-checker [REMOVED] Checks whether LDAP signing and channel binding are required and / or enforced
173
182
[*] maq Retrieves the MachineAccountQuota domain-level attribute
174
183
[*] obsolete Extract all obsolete operating systems from LDAP
175
184
[*] pso Module to get the Fine Grained Password Policy/PSOs
185
+
[*] sccm Find a SCCM infrastructure in the Active Directory
176
186
[*] subnets Retrieves the different Sites and Subnets of an Active Directory
177
-
[*] user-desc Get user descriptions stored in Active Directory
178
187
[*] whoami Get details of provided user
188
+
189
+
CREDENTIAL_DUMPING
190
+
[*] get-desc-users Get description of the users. May contain password
191
+
[*] get-info-users Get the info field of all users. May contain password
192
+
[*] get-unixUserPassword Get unixUserPassword attribute from all users in ldap
193
+
[*] get-userPassword Get userPassword attribute from all users in ldap
194
+
[*] laps Retrieves all LAPS passwords which the account has read permissions for.
195
+
[*] user-desc Get user descriptions stored in Active Directory
196
+
197
+
PRIVILEGE_ESCALATION
198
+
[*] pre2k Identify pre-created computer accounts, save the results to a file, and obtain TGTs for each
0 commit comments