From 445f7b2510c4553dcd9451bc4daccb20c8e67cbb Mon Sep 17 00:00:00 2001 From: HarmJ0y Date: Mon, 16 Jan 2017 23:52:19 -0500 Subject: Changed -KerberosPreauthNotRequired to -PreauthNotRequired --- Recon/PowerView.ps1 | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) (limited to 'Recon') diff --git a/Recon/PowerView.ps1 b/Recon/PowerView.ps1 index ef9048a..79a415c 100755 --- a/Recon/PowerView.ps1 +++ b/Recon/PowerView.ps1 @@ -4471,7 +4471,7 @@ Switch. Return user accounts that are marked as 'sensitive and not allowed for d Switch. Return computer objects that are trusted to authenticate for other principals. -.PARAMETER KerberosPreauthNotRequired +.PARAMETER PreauthNotRequired Switch. Return user accounts with "Do not require Kerberos preauthentication" set. @@ -4628,8 +4628,9 @@ The raw DirectoryServices.SearchResult object, if -Raw is enabled. [Switch] $TrustedToAuth, + [Alias('KerberosPreauthNotRequired', 'NoPreauth')] [Switch] - $KerberosPreauthNotRequired, + $PreauthNotRequired, [ValidateNotNullOrEmpty()] [String] @@ -4763,7 +4764,7 @@ The raw DirectoryServices.SearchResult object, if -Raw is enabled. Write-Verbose '[Get-DomainUser] Searching for users that are trusted to authenticate for other principals' $Filter += '(msds-allowedtodelegateto=*)' } - if ($PSBoundParameters['KerberosPreauthNotRequired']) { + if ($PSBoundParameters['PreauthNotRequired']) { Write-Verbose '[Get-DomainUser] Searching for user accounts that do not require kerberos preauthenticate' $Filter += '(userAccountControl:1.2.840.113556.1.4.803:=4194304)' } -- cgit v1.2.3