diff options
author | HarmJ0y <will@harmj0y.net> | 2016-12-20 23:13:46 -0500 |
---|---|---|
committer | HarmJ0y <will@harmj0y.net> | 2016-12-20 23:13:46 -0500 |
commit | 96ae5e3f612848a5bfc553697ba8c5f91f12963d (patch) | |
tree | 8822bf39ca67f87879a14dc61f0e378874ac7f29 | |
parent | 1916464092b9f1225edfa40589203ea97ec407c9 (diff) | |
download | PowerSploit-96ae5e3f612848a5bfc553697ba8c5f91f12963d.tar.gz PowerSploit-96ae5e3f612848a5bfc553697ba8c5f91f12963d.zip |
type correction
-rwxr-xr-x | Recon/PowerView.ps1 | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/Recon/PowerView.ps1 b/Recon/PowerView.ps1 index b50c647..17d5b9e 100755 --- a/Recon/PowerView.ps1 +++ b/Recon/PowerView.ps1 @@ -4453,7 +4453,7 @@ Switch. Return user accounts that are marked as 'sensitive and not allowed for d Switch. Return computer objects that are trusted to authenticate for other principals. -.PARAMETER KerberosPreuthNotRequired +.PARAMETER KerberosPreauthNotRequired Switch. Return user accounts with "Do not require Kerberos preauthentication" set. @@ -4611,7 +4611,7 @@ The raw DirectoryServices.SearchResult object, if -Raw is enabled. $TrustedToAuth, [Switch] - $KerberosPreuthNotRequired, + $KerberosPreauthNotRequired, [ValidateNotNullOrEmpty()] [String] @@ -4742,7 +4742,7 @@ The raw DirectoryServices.SearchResult object, if -Raw is enabled. Write-Verbose '[Get-DomainUser] Searching for users that are trusted to authenticate for other principals' $Filter += '(msds-allowedtodelegateto=*)' } - if ($PSBoundParameters['KerberosPreuthNotRequired']) { + if ($PSBoundParameters['KerberosPreauthNotRequireduthNotRequired']) { Write-Verbose '[Get-DomainUser] Searching for user accounts that do not require kerberos preauthenticate' $Filter += '(userAccountControl:1.2.840.113556.1.4.803:=4194304)' } |