Certified Red Team Professional (CRTP) - Notes
HomeGitHubPortfolioTwitter/XMediumCont@ct
  • 📝Certified Red Team Professional (CRTP) - Notes
    • ℹ️0 - Course Summary
      • 1.1
      • 1.2
    • 1️⃣1 - Active Directory (AD)
      • 1.1 - Introduction to Active Directory (AD)
      • 1.2 - Physical Components of AD
      • 1.3 - Logical Components of AD
    • 2️⃣2 - PowerShell
      • 2.1 - Introduction to PowerShell
      • 2.2 - Security and Detection
    • 3️⃣3 - AD Enumeration
      • 3.1 - Host & User Identification
      • 3.2 - Common Services Enum
        • 3.2.1 - LDAP & DNS Enum
        • 3.2.2 - SMB Enum & Common Attacks
      • 3.3 - Domain Enumeration
        • 3.3.1 - PowerView
          • 3.3.1.1 - Domain Enumeration (Video Lab)
        • 3.3.2 - BloodHound
    • 4️⃣4 - Trust and Privileges Mapping
      • 4.1 - Access Control (ACL/ACE)
      • 4.2 - Group Policy
      • 4.3 - Trusts
    • 5️⃣5 - Local Privilege Escalation
      • 5.1 - Privilege Escalation
        • 5.1.1 - Feature Abuse
        • 5.1.2 - Relaying
        • 5.1.3 - GPO Abuse
        • 5.1.4 - Unquoted Service Path
      • 5.2 - Tools
    • 6️⃣6 - Lateral Movement
      • 6.1 - PowerShell Remoting & Tradecraft
      • 6.2 - Crentials Extraction & Mimikatz
    • 9️⃣7 - Kerberos Attack and Defense (Golden, Silver tickets and more)
      • 7.1 - Kerberos Intro
      • 7.2 - AS-REP Roasting
      • 7.3 - Kerberoasting
      • 7.4 - User Enum in Kerberos
    • 6️⃣8 - Persistence
      • 8.1 - Golden Ticket
      • 8.2 - Silver Ticket
      • 8.3 - Diamond Ticket
    • Lab
      • 0 - Lab Instructions
      • 1 - Learning Object 1️
      • 2 - Learning Object 2️
      • 3 - Learning Object 3️
      • 4 - Learning Object 4️
      • 5 - Learning Object 5️
      • 6 - Learning Object 6️
      • 7 - Learning Object 7️
    • 📄Report
      • How to write a PT Report
  • 🛣️RoadMap / Exam Preparation
  • 📔CRTP Cheat Sheet
Powered by GitBook
On this page
  1. Certified Red Team Professional (CRTP) - Notes
  2. 3 - AD Enumeration
  3. 3.3 - Domain Enumeration
  4. 3.3.1 - PowerView

3.3.1.1 - Domain Enumeration (Video Lab)

Previous3.3.1 - PowerViewNext3.3.2 - BloodHound

Last updated 16 days ago

  • Start InviShell (using cmd)

C:\AD\Tools\InviShell\RunWithRegistryNonAdmin.bat
  • Start PowerView (using powershell, if you've run InviShell powershell It's already running)

. C:\AD\Tools\Powerview.ps1
  • Get Domain Information and SID

Get-NetDomain
Get-DomainSID
  • We can get some information regarding forest using trust relationship:

Get-Domain -Domain moneycorp.local
  • Retrieve domain policy for the current domain and for another domain:

Get-DomainPolicyData
Get-DomainPolicyData (Get-DomainPolicyData).systemaccess
(Get-DomainPolicyData -domain moneycorp.local).systemaccess
  • Get Domain Controller:

Get-DomainController

Get a list of users in the current domain:

Get-DomainUser
Get-DomainUser -Identity student867

Get list of all properties for users in the current domain

Get-DomainUser | select samaccountname
Get-DomainUser -Properties samaccountname,logonCount
  • Search for a particular string in a user's attributes:

Get-DomainUser -LDAPFilter "Description=*built*" | Select name,Description
  • Get all the groups in the current domain

Get-DomainGroup | select Name
Get-DomainGroup -Domain moneycorp.local
  • Get a list of computers in the current domain:

Get-DomainComputer | select dnshostname,logonCount
  • Get all the groups in the current domain

Get-DomainGroup | select Name
Get-DomainGroup -Domain Administrators
  • Get all groups containing the word "admin" in group name:

Get-DomainGroup *admin* | select name
  • Get the membership of a domain:

Get-DomainGroupMember -Identity "Domain Admins" -Recurse
Get-DomainGroup -UserName student867
  • List all the local groups on a machine (needs administrator privs on a non dc machine):

Get-NetLocalGroup -ComputerName dcorp-dc
  • Get members of the local group "Administrators" on a machine (needs administrator privs on a non dc machine):

Get-NetLocalGroupMember -ComputerName dcorp-dc -GroupName Administrators
  • Get actively logged users on a computer (needs local admin rights on the target):

Get-NetLoggedon -ComputerName dcorp-adminsrv
  • Find shares on hosts in the current domain:

Invoke-ShareFinder -Verbose

Another good thing to enumerate shares, files, ACLs for shares, networks, computers, etc genereting a nice HTML report is PowerHuntShares

📝
3️⃣