Age | Commit message (Collapse) | Author | Files | Lines |
|
Fixed null access control entry in results.
|
|
Hi,
I know you guys mentioned this before, but I've not this implemented.
I wrote Get-GPODelegation that finds users with write permissions on Group Policy objects, for a potential privilege escalation path.
As requested, moved into dev branch.
|
|
bug fix for nested OUs with similar starting names.
|
|
Generalized ACE creation and added LDAP logonhours conversion
|
|
Added ConvertFrom-LDAPLogonHours and New-ADObjectAccessControlEntry
|
|
function to accept any policy.
|
|
Fix for impersonation in Get-NetLocalGroup*
|
|
Invoke-CompareAttributesForClass.ps1
|
|
Support for DNs containing commas
|
|
The DFS subfunctions only accept a single $Domain
|
|
Set explicit LDAP SecurityMasks settings
|
|
Changed the LDAP SecurityMasks settings so that you can change the Owner/DACL if you only have WriteOwner/WriteDacl permissions on the object (Default SecurityMasks is "Owner, Group, Dacl")
|
|
If an object's distinguished name contains a comma then it ends up quoted:
CN=Smith\, John,OU=Admins,DC=example,DC=com
This breaks a number of functions which attempt to identify DOMAIN\name
by matching on a \ anywhere in the specified identity before checking if
the identity was a DN (or SID or GUID).
For example, attempting to list members of "Domain Admins" using
Get-DomainGroupMember gives the following:
VERBOSE: [Convert-ADName] Error initializing translation for 'CN=Smith\, John,OU=Admins,DC=example,DC=com' : Exception calling "InvokeMember" with "5" argument(s): "The specified domain either does not exist or could not be contacted. (Exception from HRESULT: 0x8007054B)"
VERBOSE: [Convert-ADName] Error translating 'CN=Smith\, John,OU=Admins,DC=example,DC=com' : The specified domain either does not exist or could not be contacted. (Exception from HRESULT: 0x8007054B)
VERBOSE: [Get-DomainObject] Get-DomainObject filter string: (objectClass=*)
The fix implemented here is to perform more specific pattern matching
prior to falling back to looking for a \. The order is SID, DN, GUID,
qualified name (DOMAIN\name), and then plain name.
|
|
Specifying the type as an array of strings results in an error when
passing on the parameter to Get-DomainSearcher:
C:\> Get-DomainDFSShare -Domain test
Get-DomainSearcher : Cannot process argument transformation on parameter 'Domain'. Cannot convert value to type System.String.
At PowerView.ps1:10242 char:46
|
|
Fix for System.InvalidCastException:
https://github.com/PowerShellMafia/PowerSploit/issues/152
|
|
|
|
|
|
Removed unnecessary warning about the 'WinNT' method
Fixed Get-NetLocalGroup* to use impersonation - netapi32 functions weren't working.
|
|
update local fork
|
|
|
|
|
|
|
|
Fixed KerberosPreauthNotRequired
|
|
|
|
|
|
|
|
instead of a string
|
|
|
|
|
|
|
|
Words :P
|
|
|
|
|
|
hash output.
Added a bit more error handling when requesting the SPN kerberos ticket.
|
|
Fix errors gathering the forest SID
|
|
Added -SearchForest to search all reachable domain trust \SYSVOL\'s
Each password is now output as a separate object.
|
|
Pull the SID directly from the 'krbtgt' user to avoid errors in ConvertTo-SID
|
|
function
|
|
type and impersonation level
Added Get-ProcessTokenType to enumerate type/impersonation level of a specified process
|
|
|
|
|
|
Added -TrustedToAuth to Get-DomainUser
|
|
|
|
-Domain bug fix in Find-DomainUserLocation stealth
|
|
-(More) PSScriptAnalyzering
-Tweaking of synopsis blocks in order to support platyPS
-Code standardization
-Generated docs
|
|
-PSScriptAnalyzering
-Tweaking of synopsis blocks in order to support platyPS
-Code standardization
-Generated docs
|
|
|
|
-PSScriptAnalyzering
-Tweaking of synopsis blocks in order to support platyPS
-Code standardization
-Generated docs
|
|
-PSScriptAnalyzering
-Tweaking of synopsis blocks in order to support platyPS
-Code standardization
-Generated docs
|
|
-PSScriptAnalyzering
-Tweaking of synopsis blocks in order to support platyPS
-Code standardization
-Generated docs
|