Commit Graph

39 Commits

Author SHA1 Message Date
Stuart Morgan 2343f43e7c Added reference to function to powersploit.psd1 and recon.psd1 2015-12-29 13:37:40 +00:00
Stuart Morgan 841150e1c6 Added Find-ManagedSecurityGroups 2015-12-28 17:54:47 +00:00
Matt Graeber 9f183e3651 Set all module versions to 3.0
Also cleaned up some module manifest cruft.
2015-12-18 16:28:03 -08:00
Matt Graeber 55098d59e9 Removed version numbers from scripts
A module should maintain a version number not the individual scripts.
2015-12-16 17:08:58 -08:00
Matt Graeber c2a70924e1 Removed all version numbers from scripts
Scripts in a module should not be individually versioned. Only the
module should be versioned.
2015-12-16 17:08:57 -08:00
Harmj0y 5690b09027 Get-NetDomain now not called if -ComputerName or -ComputerFile are passed for meta functions, in order to prevent failure when running on a non-domain joined machine
took out FQDN Pester tests from Recon.tests.ps1 that used $env:userdnsdomain
2015-12-14 19:01:10 -05:00
Harmj0y a336562b70 Added Invoke-DowngradeAccount to set an account to use reversible encryption. 2015-12-11 14:58:07 -05:00
Harmj0y a0b95c36b4 Domain local group query fix.
Added ConvertFrom-UACValue to convert binary UAC values to human readable format.
Corrected logic in Set-ADObject.
2015-12-11 10:21:39 -05:00
Harmj0y 5fb690518d Integration of PowerView into ./Recon/ 2015-12-03 21:50:45 -05:00
Matt Graeber 12ce71b9f4 Normalizing all files to ascii encoding 2015-11-04 13:48:27 -05:00
Matt Graeber 2dd1f5920d Revert "Normalizing all files to ascii encoding"
This reverts commit 5a812ce823.
2015-11-04 13:41:36 -05:00
Matt Graeber 5a812ce823 Normalizing all files to ascii encoding 2015-11-04 13:40:02 -05:00
clymb3r 364dde11e1 Fixing error in script 2014-04-28 20:45:20 -07:00
clymb3r d085c5b1d7 Fixing formatting 2014-04-16 21:16:02 -07:00
clymb3r f03ab1444d Fixing garbage put in by merge 2014-04-16 21:11:34 -07:00
clymb3r b783b459c1 Merge branch 'master' of https://github.com/mattifestation/PowerSploit
Conflicts:
	Recon/Get-ComputerDetails.ps1
	Recon/Recon.psd1
2014-04-16 21:02:50 -07:00
mattifestation 202e8f4b36 Adding internal recon/privesc privesc functions #40
Added the following recon functions written by Joe Bialek
(@JosephBialek):

- Find-4648Logons
- Find-4624Logons
- Find-AppLockerLogs
- Find-PSScriptsInPSAppLog
- Find-RDPClientConnections
- Get-ComputerDetails (Combines all of the above functions into a single
function)
2014-03-16 10:02:37 -04:00
clymb3r 77bcb336e0 Separating out functions & bug fix
All info gathering pieces of this script can now be called individually.
Fixed a bug where the user SID wasn't being converted to a username in
the RDP function.
2014-03-02 21:18:28 -08:00
clymb3r 308042f493 Adding Get-ComputerDetails recon script
Get-ComputerDetails is a recon script which pulls a variety of useful
information off a computer which might later be useful by an attacker.
This includes:
Logons
AppLocker process start logs
PowerShell logs to find scripts run
RDP Client saved servers
2014-02-20 17:47:27 -08:00
Matt Graeber d9ca5357e4 Merge pull request #26 from obscuresec/master
Update Invoke-ReverseDnsLookup.ps1
2014-01-30 14:38:50 -08:00
Chris Campbell 14780a5678 Update Invoke-ReverseDnsLookup.ps1
Added pipeline support and verbose statement.
2014-01-30 17:13:25 -05:00
mattifestation 237d362acf Normalized all scripts to ASCII encoding 2013-11-13 21:01:02 -05:00
webstersprodigy c4cd73a9cf Fix for hostfiles option in powershell 2 2013-11-03 22:48:50 -08:00
webstersprodigy 54971370cf Fix for hostfiles option in powershell 2 2013-10-22 21:04:24 -07:00
Matt Graeber 49b9523c10 Merge branch 'Portscan' of https://github.com/webstersprodigy/PowerSploit into webstersprodigy-Portscan
Conflicts:
	Recon/Recon.psd1
2013-07-06 13:34:12 -04:00
Matt Graeber 371c65c9a7 Updated Get-GPPPassword 2013-07-03 05:46:44 -04:00
Rich Lundeen 98510d8097 IPv6 support in hosts param 2013-06-25 22:07:36 -07:00
Rich Lundeen 05ab35a3af fixing EOL spaces (again, sorry) 2013-06-18 15:15:40 -07:00
Rich Lundeen 60a6044d36 fixing EOL spaces 2013-06-18 15:10:54 -07:00
Rich Lundeen 223527d4cd Addressed mattifestation feedback
See https://github.com/mattifestation/PowerSploit/pull/6#issuecomment-19289063

1) I like this feedback a lot and took it.

2) I tried going thread only but it got messed up with very large scans. Eventually,
I didn't think it was worth the amount of effort to make it reliable with only threads

3) Tried to do this

4) Did this

5) I like the idea in general and I took this one place (top-ports), but not for the two
examples you gave. The reasoning is, I want people to be able to specify various options
and arrays aren't that flexible. For example, I want people to specify a port list like
"80,90,8080-8090". Similar with CIDR, since that's one option, but they could also be
specifying hostnames e.g. "google.com,192.168.1.1/24,10.0.0.1"
2013-06-18 13:17:06 -07:00
Rich Lundeen af49f5cfaf small style update 2013-06-11 10:48:12 -07:00
Rich Lundeen 3ec7b95f8d Powershell 2.0 fixes - should work now 2013-06-11 10:22:37 -07:00
Rich Lundeen 03e0a0b489 fixing powershell 2.0 compat 2013-06-10 16:09:07 -07:00
Rich Lundeen 9a5b1ae75a removed a few comments 2013-06-09 21:18:38 -07:00
Rich Lundeen ebe7f0981a added invoke-portscan module 2013-06-09 21:08:44 -07:00
bitform 40eb187bca Consistency improvements in comment-based help 2013-01-21 08:33:51 -05:00
bitform b53b6a03a5 Added 'Recon' Module 2013-01-20 21:32:27 -05:00
bitform 40407697fd Added additional recon dictionaries 2012-08-09 19:00:17 -04:00
bitform 0ecd7cb158 Added Get-HttpStatus and 'Recon' directory
* All recon scripts not live in the 'Recon' directory
* Added Get-HttpStatus - An http[s] enumeration tool
* Added default dictionary for Get-HttpStatus - .\Dictionaries\admin.txt
* Moved Invoke-ReverseDnsLookup to 'Recon'
2012-08-07 19:14:11 -04:00