Skip to content

-DomainController using current security context (no mandatory creds) #62

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 3 commits into from
Jul 18, 2020

Conversation

phackt
Copy link
Contributor

@phackt phackt commented Jul 2, 2020

Hi @nullbind , hope you're fine.

Dealing with the issue #61, i made a PR. I updated the function Get-DomainObject.

What you can do now, for example:

PS C:\temp> Get-DomainObject -LdapFilter "(&(servicePrincipalName=*))"
PS C:\temp> Get-DomainObject -LdapFilter "(&(servicePrincipalName=*))" -DomainController 10.10.0.2:4444
PS C:\temp> Get-DomainObject -LdapFilter "(&(servicePrincipalName=*))" -DomainController 10.10.0.2:4444 -Username phackt -Password B3stPassEver  

Basically if no credentials are supplied, it will used the current security context to authenticate against the DC - may be useful if for example during an engagement, you only have the hash of the domain user you are using for your enumeration (and you spawned a session for ex with mimikatz pth).

Otherwise it will authenticate thanks to the credentials supplied as arguments. Note that you can specify the format IP:PORT if you wish to target a pivot machine.

Hope all of this makes sense and will be helpful.

Let me know if you wish more information!
Have a nice day,

@phackt phackt changed the title -DomainController using current security context (no creds supplied) -DomainController using current security context (no mandatory creds) Jul 3, 2020
@nullbind
Copy link
Collaborator

nullbind commented Jul 4, 2020

Awesome! I’ll test it and try to get it merged this week. Thanks for the help!

@phackt
Copy link
Contributor Author

phackt commented Jul 4, 2020

no prob, let me know if i can help. Cheers.

@phackt
Copy link
Contributor Author

phackt commented Jul 17, 2020

Hi @nullbind, i know you are busy but if i can help let me know. Thanks.

@nullbind nullbind merged commit 6b104ad into NetSPI:master Jul 18, 2020
@phackt
Copy link
Contributor Author

phackt commented Jul 19, 2020

Thanks man!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants