diff options
author | HarmJ0y <will@harmj0y.net> | 2016-12-14 19:23:28 -0500 |
---|---|---|
committer | HarmJ0y <will@harmj0y.net> | 2016-12-14 19:23:28 -0500 |
commit | ad32d6c75b4e70a6b2e1b56a683a6ba71f1c0683 (patch) | |
tree | 37d55ec7d13b26efbeeb183d2bb79f9b5972205b /docs | |
parent | 59e6f94e763d40614284d43823a391cafd384c4c (diff) | |
download | PowerSploit-ad32d6c75b4e70a6b2e1b56a683a6ba71f1c0683.tar.gz PowerSploit-ad32d6c75b4e70a6b2e1b56a683a6ba71f1c0683.zip |
For ./Recon/ :
-(More) PSScriptAnalyzering
-Tweaking of synopsis blocks in order to support platyPS
-Code standardization
-Generated docs
Diffstat (limited to 'docs')
-rwxr-xr-x | docs/Recon/Export-PowerViewCSV.md | 2 | ||||
-rwxr-xr-x | docs/Recon/Get-ComputerDetail.md (renamed from docs/Recon/Get-ComputerDetails.md) | 16 | ||||
-rwxr-xr-x | docs/Recon/Get-HttpStatus.md | 8 | ||||
-rwxr-xr-x | docs/Recon/Invoke-Portscan.md | 8 | ||||
-rwxr-xr-x | docs/Recon/Invoke-ReverseDnsLookup.md | 14 | ||||
-rwxr-xr-x | docs/Recon/Set-DomainObject.md | 26 | ||||
-rwxr-xr-x[-rw-r--r--] | docs/Recon/index.md | 0 |
7 files changed, 25 insertions, 49 deletions
diff --git a/docs/Recon/Export-PowerViewCSV.md b/docs/Recon/Export-PowerViewCSV.md index 1597249..d2d2a89 100755 --- a/docs/Recon/Export-PowerViewCSV.md +++ b/docs/Recon/Export-PowerViewCSV.md @@ -1,7 +1,7 @@ # Export-PowerViewCSV
## SYNOPSIS
-Converts objects into a series of comma-separated (CSV) strings and saves the
+Converts objects into a series of comma-separated (CSV) strings and saves the
strings in a CSV file in a thread-safe manner.
Author: Will Schroeder (@harmj0y)
diff --git a/docs/Recon/Get-ComputerDetails.md b/docs/Recon/Get-ComputerDetail.md index 6bc3e91..15a3feb 100755 --- a/docs/Recon/Get-ComputerDetails.md +++ b/docs/Recon/Get-ComputerDetail.md @@ -1,17 +1,17 @@ -# Get-ComputerDetails
+# Get-ComputerDetail
## SYNOPSIS
This script is used to get useful information from a computer.
-Function: Get-ComputerDetails
-Author: Joe Bialek, Twitter: @JosephBialek
-Required Dependencies: None
+Function: Get-ComputerDetail
+Author: Joe Bialek, Twitter: @JosephBialek
+Required Dependencies: None
Optional Dependencies: None
## SYNTAX
```
-Get-ComputerDetails [-ToString]
+Get-ComputerDetail [-ToString]
```
## DESCRIPTION
@@ -27,12 +27,12 @@ Currently, the script gets the following information: ### -------------------------- EXAMPLE 1 --------------------------
```
-Get-ComputerDetails
+Get-ComputerDetail
```
Gets information about the computer and outputs it as PowerShell objects.
-Get-ComputerDetails -ToString
+Get-ComputerDetail -ToString
Gets information about the computer and outputs it as raw text.
## PARAMETERS
@@ -57,7 +57,7 @@ Accept wildcard characters: False ## OUTPUTS
## NOTES
-This script is useful for fingerprinting a server to see who connects to this server (from where), and where users on this server connect to.
+This script is useful for fingerprinting a server to see who connects to this server (from where), and where users on this server connect to.
You can also use it to find Powershell scripts and executables which are typically run, and then use this to backdoor those files.
## RELATED LINKS
diff --git a/docs/Recon/Get-HttpStatus.md b/docs/Recon/Get-HttpStatus.md index a8a7dbb..4311983 100755 --- a/docs/Recon/Get-HttpStatus.md +++ b/docs/Recon/Get-HttpStatus.md @@ -3,10 +3,10 @@ ## SYNOPSIS
Returns the HTTP Status Codes and full URL for specified paths.
-PowerSploit Function: Get-HttpStatus
-Author: Chris Campbell (@obscuresec)
-License: BSD 3-Clause
-Required Dependencies: None
+PowerSploit Function: Get-HttpStatus
+Author: Chris Campbell (@obscuresec)
+License: BSD 3-Clause
+Required Dependencies: None
Optional Dependencies: None
## SYNTAX
diff --git a/docs/Recon/Invoke-Portscan.md b/docs/Recon/Invoke-Portscan.md index 49d9e32..8e1ef27 100755 --- a/docs/Recon/Invoke-Portscan.md +++ b/docs/Recon/Invoke-Portscan.md @@ -3,10 +3,10 @@ ## SYNOPSIS
Simple portscan module
-PowerSploit Function: Invoke-Portscan
-Author: Rich Lundeen (http://webstersProdigy.net)
-License: BSD 3-Clause
-Required Dependencies: None
+PowerSploit Function: Invoke-Portscan
+Author: Rich Lundeen (http://webstersProdigy.net)
+License: BSD 3-Clause
+Required Dependencies: None
Optional Dependencies: None
## SYNTAX
diff --git a/docs/Recon/Invoke-ReverseDnsLookup.md b/docs/Recon/Invoke-ReverseDnsLookup.md index 348ad91..2c74e3c 100755 --- a/docs/Recon/Invoke-ReverseDnsLookup.md +++ b/docs/Recon/Invoke-ReverseDnsLookup.md @@ -3,10 +3,10 @@ ## SYNOPSIS
Perform a reverse DNS lookup scan on a range of IP addresses.
-PowerSploit Function: Invoke-ReverseDnsLookup
-Author: Matthew Graeber (@mattifestation)
-License: BSD 3-Clause
-Required Dependencies: None
+PowerSploit Function: Invoke-ReverseDnsLookup
+Author: Matthew Graeber (@mattifestation)
+License: BSD 3-Clause
+Required Dependencies: None
Optional Dependencies: None
## SYNTAX
@@ -17,7 +17,7 @@ Invoke-ReverseDnsLookup [-IpRange] <String> ## DESCRIPTION
Invoke-ReverseDnsLookup scans an IP address range for DNS PTR records.
-This script is useful for performing DNS reconnaisance prior to conducting an authorized penetration test.
+This script is useful for performing DNS reconnaissance prior to conducting an authorized penetration test.
## EXAMPLES
@@ -34,7 +34,7 @@ IP HostName 74.125.228.4 iad23s05-in-f4.1e100.net
74.125.228.5 iad23s05-in-f5.1e100.net
74.125.228.6 iad23s05-in-f6.1e100.net
-
+
Description
-----------
Returns the hostnames of the IP addresses specified by the CIDR range.
@@ -50,7 +50,7 @@ IP HostName 74.125.228.4 iad23s05-in-f4.1e100.net
74.125.228.5 iad23s05-in-f5.1e100.net
74.125.228.6 iad23s05-in-f6.1e100.net
-
+
Description
-----------
Returns the hostnames of the IP addresses specified by the IP range specified.
diff --git a/docs/Recon/Set-DomainObject.md b/docs/Recon/Set-DomainObject.md index 482d86d..8cb283b 100755 --- a/docs/Recon/Set-DomainObject.md +++ b/docs/Recon/Set-DomainObject.md @@ -12,8 +12,7 @@ Required Dependencies: Get-DomainObject ```
Set-DomainObject [[-Identity] <String[]>] [-Set <Hashtable>] [-XOR <Hashtable>] [-Clear <String[]>]
[-Domain <String>] [-LDAPFilter <String>] [-SearchBase <String>] [-Server <String>] [-SearchScope <String>]
- [-ResultPageSize <Int32>] [-ServerTimeLimit <Int32>] [-SecurityMasks <String>] [-Tombstone]
- [-Credential <PSCredential>]
+ [-ResultPageSize <Int32>] [-ServerTimeLimit <Int32>] [-Tombstone] [-Credential <PSCredential>]
```
## DESCRIPTION
@@ -281,21 +280,6 @@ Accept pipeline input: False Accept wildcard characters: False
```
-### -SecurityMasks
-{{Fill SecurityMasks Description}}
-
-```yaml
-Type: String
-Parameter Sets: (All)
-Aliases:
-
-Required: False
-Position: Named
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
### -Tombstone
Switch.
Specifies that the searcher should also return deleted/tombstoned objects.
@@ -332,14 +316,6 @@ Accept wildcard characters: False ## OUTPUTS
-### PowerView.ADObject
-
-Custom PSObject with translated AD object property fields, if -PassThru is enabled.
-
-PowerView.ADObject.Raw
-
-The raw DirectoryServices.SearchResult object, if -PassThru and -Raw are enabled.
-
## NOTES
## RELATED LINKS
diff --git a/docs/Recon/index.md b/docs/Recon/index.md index b3eca5c..b3eca5c 100644..100755 --- a/docs/Recon/index.md +++ b/docs/Recon/index.md |