-
Invoke-Command
- Running
Commands
PS C:\Users\Administrator> Invoke-Command -ScriptBlock {whoami;(Get-Host).Version;Get-Process} -ComputerName JOHN-PC -Credential John-PC\John john-pc\john Major Minor Build Revision PSComputerName ----- ----- ----- -------- -------------- 1 0 0 0 JOHN-PC Id : 1288 Handles : 23 CPU : 0 Name : cmd PSComputerName : JOHN-PC Id : 1552 Handles : 22 CPU : 0.0100144 Name : cmd PSComputerName : JOHN-PC Id : 1220 Handles : 40 CPU : 0.050072 Name : conhost PSComputerName : JOHN-PC Id : 3124 Handles : 34 CPU : 0 Name : conhost PSComputerName : JOHN-PC Id : 352 Handles : 433 CPU : 0.100144 Name : csrss PSComputerName : JOHN-PC Id : 408 Handles : 206 CPU : 0.4706768 Name : csrss PSComputerName : JOHN-PC Id : 2920 Handles : 79 CPU : 0.0100144 Name : dllhost PSComputerName : JOHN-PC Id : 912 Handles : 66 CPU : 0.0200288 Name : dwm PSComputerName : JOHN-PC Id : 696 Handles : 786 CPU : 2.9342192 Name : explorer PSComputerName : JOHN-PC Id : 0 Handles : 0 CPU : Name : Idle PSComputerName : JOHN-PC Id : 492 Handles : 744 CPU : 0.901296 Name : lsass PSComputerName : JOHN-PC Id : 500 Handles : 196 CPU : 0.0701008 Name : lsm PSComputerName : JOHN-PC Id : 3160 Handles : 56 CPU : 0.0701008 Name : notepad PSComputerName : JOHN-PC Id : 2924 Handles : 134 CPU : 0.1301872 Name : python PSComputerName : JOHN-PC Id : 1664 Handles : 627 CPU : 0.50072 Name : SearchIndexer PSComputerName : JOHN-PC Id : 476 Handles : 199 CPU : 0.7310512 Name : services PSComputerName : JOHN-PC Id : 272 Handles : 29 CPU : 0.0600864 Name : smss PSComputerName : JOHN-PC Id : 1356 Handles : 280 CPU : 0.0200288 Name : spoolsv PSComputerName : JOHN-PC Id : 624 Handles : 354 CPU : 0.3605184 Name : svchost PSComputerName : JOHN-PC Id : 736 Handles : 267 CPU : 0.3304752 Name : svchost PSComputerName : JOHN-PC Id : 788 Handles : 550 CPU : 0.50072 Name : svchost PSComputerName : JOHN-PC Id : 872 Handles : 514 CPU : 3.50504 Name : svchost PSComputerName : JOHN-PC Id : 960 Handles : 1142 CPU : 3.5150544 Name : svchost PSComputerName : JOHN-PC Id : 1124 Handles : 452 CPU : 0.4706768 Name : svchost PSComputerName : JOHN-PC Id : 1232 Handles : 696 CPU : 0.6609504 Name : svchost PSComputerName : JOHN-PC Id : 1392 Handles : 306 CPU : 0.5708208 Name : svchost PSComputerName : JOHN-PC Id : 1500 Handles : 349 CPU : 0.200288 Name : svchost PSComputerName : JOHN-PC Id : 1956 Handles : 373 CPU : 11.3262864 Name : svchost PSComputerName : JOHN-PC Id : 2772 Handles : 344 CPU : 0.9413536 Name : svchost PSComputerName : JOHN-PC Id : 3816 Handles : 96 CPU : 0.0300432 Name : svchost PSComputerName : JOHN-PC Id : 4 Handles : 565 CPU : Name : System PSComputerName : JOHN-PC Id : 1292 Handles : 138 CPU : 0.050072 Name : taskhost PSComputerName : JOHN-PC Id : 3528 Handles : 149 CPU : 0.0600864 Name : taskhost PSComputerName : JOHN-PC Id : 684 Handles : 115 CPU : 0.25036 Name : VBoxService PSComputerName : JOHN-PC Id : 2104 Handles : 140 CPU : 0.0600864 Name : VBoxTray PSComputerName : JOHN-PC Id : 400 Handles : 74 CPU : 0.2303312 Name : wininit PSComputerName : JOHN-PC Id : 448 Handles : 113 CPU : 0.2703888 Name : winlogon PSComputerName : JOHN-PC Id : 556 Handles : 417 CPU : 0.4105904 Name : wmpnetwk PSComputerName : JOHN-PC Id : 3532 Handles : 247 CPU : 0.7711088 Name : wsmprovhost PSComputerName : JOHN-PC PS C:\Users\Administrator>
- Running
Scripts
PS C:\Users\Administrator\Desktop> Invoke-Command -FilePath .\HelloWorld.ps1 -ComputerName JOHN-PC -Credential John-PC\John Hello World PS C:\Users\Administrator\Desktop>
PS C:\Users\Administrator\Desktop> Invoke-Command -FilePath .\nishang-master\Gather\Check-VM.ps1 -ComputerName JOHN-PC -Credential John-PC\John
-
Running
Modules
- Import the
Module
PS C:\Users\Administrator\Desktop> Import-Module .\nishang-master\powerpreter\Powerpreter.psm1 WARNING: The names of some imported commands from the module 'Powerpreter' include unapproved verbs that might make them less discoverable. To find the commands with unapproved verbs, run the Import-Module command again with the Verbose parameter. For a list of approved verbs, type Get-Verb. WARNING: Some imported command names contain one or more of the following restricted characters: # , ( ) {{ }} [ ] & - / \ $ ^ ; : " ' < > | ? @ ` * % + = ~ PS C:\Users\Administrator\Desktop>
- Check that the
Module
is imported
PS C:\Users\Administrator\Desktop> Get-Module ModuleType Version Name ExportedCommands ---------- ------- ---- ---------------- Manifest 3.1.0.0 Microsoft.PowerShell.Management {Add-Computer, Add-Content, Checkpoint-Computer, Clear-Content...} Manifest 3.0.0.0 Microsoft.PowerShell.Security {ConvertFrom-SecureString, ConvertTo-SecureString, Get-Acl, Get-AuthenticodeSignature...} Manifest 3.1.0.0 Microsoft.PowerShell.Utility {Add-Member, Add-Type, Clear-Variable, Compare-Object...} Manifest 3.0.0.0 Microsoft.WSMan.Management {Connect-WSMan, Disable-WSManCredSSP, Disconnect-WSMan, Enable-WSManCredSSP...} Script 0.0 Powerpreter {Add-ScrnSaveBackdoor, Base64ToString, Check-VM, Copy-VSS...} PS C:\Users\Administrator\Desktop>
- List the
Functions
of theModule
PS C:\Users\Administrator\Desktop> Get-Command -Module Powerpreter CommandType Name ModuleName ----------- ---- ---------- Function Add-ScrnSaveBackdoor Powerpreter Function Base64ToString Powerpreter Function Check-VM Powerpreter Function Copy-VSS Powerpreter Function Create-MultipleSessions Powerpreter Function DNS_TXT_Pwnage Powerpreter Function Do-Exfiltration Powerpreter Function Download Powerpreter Function Download_Execute Powerpreter Function Download-Execute-PS Powerpreter Function Enable-DuplicateToken Powerpreter Function Execute-Command-MSSQL Powerpreter Function Execute-DNSTXT-Code Powerpreter Function Execute-OnTime Powerpreter Function ExetoText Powerpreter Function FireBuster Powerpreter Function FireListener Powerpreter Function Get-Information Powerpreter Function Get-LsaSecret Powerpreter Function Get-PassHashes Powerpreter Function Get-PassHints Powerpreter Function Get-Wlan-Keys Powerpreter Function Gupt-Backdoor Powerpreter Function HTTP-Backdoor Powerpreter Function Invoke-BruteForce Powerpreter Function Invoke-CredentialsPhish Powerpreter Function Invoke-Decode Powerpreter Function Invoke-Encode Powerpreter Function Invoke-NetworkRelay Powerpreter Function Invoke-PortScan Powerpreter Function Invoke-PSGcat Powerpreter Function Invoke-PsGcatAgent Powerpreter Function Invoke-PsUACme Powerpreter Function Keylogger Powerpreter Function Out-CHM Powerpreter Function Out-DnsTxt Powerpreter Function Out-Excel Powerpreter Function Out-HTA Powerpreter Function Out-Java Powerpreter Function Out-Shortcut Powerpreter Function Out-WebQuery Powerpreter Function Out-Word Powerpreter Function Persistence Powerpreter Function Pivot Powerpreter Function Remove-Persistence Powerpreter Function Remove-Update Powerpreter Function StringtoBase64 Powerpreter Function TexttoEXE Powerpreter Function Use-Session Powerpreter PS C:\Users\Administrator\Desktop>
- Run the
Function
of theModule
PS C:\Users\Administrator\Desktop> Invoke-Command -ScriptBlock ${Function:Get-WLAN-Keys} -ComputerName JOHN-PC -Credential John-PC\John You cannot call a method on a null-valued expression. + CategoryInfo : InvalidOperation: (Replace:String) [], RuntimeException + FullyQualifiedErrorId : InvokeMethodOnNull + PSComputerName : JOHN-PC The Wireless AutoConfig Service (wlansvc) is not running. PS C:\Users\Administrator\Desktop>
- Import the
- Running
-
“Fan-Out” or “One-to-Many”
Invoke-Command -ScriptBlock {whoami;(Get-Host).Version;Get-Process} -ComputerName <DOMAIN_PC>,<DOMAIN_CONTROLLER> -Credential <DOMAIN_NAME>\Administrator
Invoke-Command -ScriptBlock {whoami;(Get-Host).Version;Get-Process} -ComputerName {Get-Content .\servers.txt} -Credential <DOMAIN_NAME>\Administrator
- Write a
PowerShell
script which searches for the presence of strings like“password”
,“username”
and“credentials”
in theC:\
directory.
Search-Sensitive.ps1
$file = Get-ChildItem -Path C:\ -Filter *.txt -Recurse
Write-Output "`nFiles Found " --------------------- $file.Count
Write-Output "`nScript Output " ---------------------
Select-String $file -Pattern username, password, credential
- Run this script on remote machines.
PS C:\Users\Administrator> Invoke-Command -FilePath .\Desktop\Code\23\Search-Sensitive.ps1 -ComputerName JOHN-PC -Credential John-PC\John
Files Found
---------------------
477
Script Output
---------------------
C:\Program Files (x86)\Nmap\nselib\data\enterprise_numbers.txt:42994:43124 PasswordBox Inc.
C:\Program Files (x86)\Nmap\nselib\data\http-folders.txt:563:/password/
C:\Program Files (x86)\Nmap\nselib\data\http-folders.txt:564:/passwords/
C:\Program Files (x86)\Nmap\nselib\data\rtsp-urls.txt:14:/CAM_ID.password.mp2
C:\Program Files (x86)\Nmap\nselib\data\rtsp-urls.txt:178:/user=admin_password=tlJwpbo6_channel=1_stream=0.sdp?real_stream
C:\Program Files (x86)\Nmap\nselib\data\tftplist.txt:167:password.bin
C:\Program Files (x86)\Nmap\nselib\data\tftplist.txt:168:password.cfg
C:\Program Files (x86)\Nmap\nselib\data\tftplist.txt:169:password.ini
C:\Python27\NEWS.txt:4376:- Issue #13642: Unquote before b64encoding user:password during Basic
C:\Python27\NEWS.txt:4796: test_tk or test_ttk_guionly under a username that is not currently logged
C:\Python27\NEWS.txt:7185: long passwords. Initial patch by JP St. Pierre.
C:\Python27\NEWS.txt:7749: TLS with authentication credentials.
C:\Python27\NEWS.txt:11063:- Patch #1698: allow '@' in username parsed by urlparse.py.
C:\Python27\NEWS.txt:11144:- When encountering a password-protected robots.txt file the
C:\Python27\NEWS.txt:11145: RobotFileParser no longer prompts interactively for a username and
C:\Python27\NEWS.txt:11146: password (bug 813986).
C:\Python27\NEWS.txt:11240:- Added an optional credentials argument to SMTPHandler, for use with
C:\Users\Administrator\Desktop\log.txt:12:C:\Program Files (x86)\Nmap\nselib\data\enterprise_numbers.txt:42994:43124 PasswordBox Inc.
C:\Users\Administrator\Desktop\log.txt:13:C:\Program Files (x86)\Nmap\nselib\data\http-folders.txt:563:/password/
C:\Users\Administrator\Desktop\log.txt:14:C:\Program Files (x86)\Nmap\nselib\data\http-folders.txt:564:/passwords/
C:\Users\Administrator\Desktop\log.txt:15:C:\Program Files (x86)\Nmap\nselib\data\rtsp-urls.txt:14:/CAM_ID.password.mp2
C:\Users\Administrator\Desktop\log.txt:16:C:\Program Files
(x86)\Nmap\nselib\data\rtsp-urls.txt:178:/user=admin_password=tlJwpbo6_channel=1_stream=0.sdp?real_stream
C:\Users\Administrator\Desktop\log.txt:17:C:\Program Files (x86)\Nmap\nselib\data\tftplist.txt:167:password.bin
C:\Users\Administrator\Desktop\log.txt:18:C:\Program Files (x86)\Nmap\nselib\data\tftplist.txt:168:password.cfg
C:\Users\Administrator\Desktop\log.txt:19:C:\Program Files (x86)\Nmap\nselib\data\tftplist.txt:169:password.ini
C:\Users\Administrator\Desktop\log.txt:20:C:\Python27\NEWS.txt:4376:- Issue #13642: Unquote before b64encoding user:password during Basic
C:\Users\Administrator\Desktop\log.txt:21:C:\Python27\NEWS.txt:4796: test_tk or test_ttk_guionly under a username that is not currently
logged
C:\Users\Administrator\Desktop\log.txt:22:C:\Python27\NEWS.txt:7185: long passwords. Initial patch by JP St. Pierre.
C:\Users\Administrator\Desktop\log.txt:23:C:\Python27\NEWS.txt:7749: TLS with authentication credentials.
C:\Users\Administrator\Desktop\log.txt:24:C:\Python27\NEWS.txt:11063:- Patch #1698: allow '@' in username parsed by urlparse.py.
C:\Users\Administrator\Desktop\log.txt:25:C:\Python27\NEWS.txt:11144:- When encountering a password-protected robots.txt file the
C:\Users\Administrator\Desktop\log.txt:26:C:\Python27\NEWS.txt:11145: RobotFileParser no longer prompts interactively for a username and
C:\Users\Administrator\Desktop\log.txt:27:C:\Python27\NEWS.txt:11146: password (bug 813986).
C:\Users\Administrator\Desktop\log.txt:28:C:\Python27\NEWS.txt:11240:- Added an optional credentials argument to SMTPHandler, for use with
C:\Users\Administrator\Desktop\log.txt:29:nishang-master\CHANGELOG.txt:32:- Added support for dumping cleartext credentials from RDP
sessions for Invoke-MimikatzWfigestDowngrade.
C:\Users\Administrator\Desktop\log.txt:30:nishang-master\CHANGELOG.txt:49:- Removed hard coded credentials from Invoke-PSGcat.ps1 and
Invoke-PSGcat in Powerpreter. So embarrassing!
C:\Users\Administrator\Desktop\log.txt:31:nishang-master\CHANGELOG.txt:74:- Credentials script renamed to Invoke-CredentialsPhish.
C:\Users\Administrator\Desktop\log.txt:32:nishang-master\CHANGELOG.txt:186:- Fixed help in Credentials.ps1
C:\Users\Administrator\Desktop\log.txt:33:nishang-master\CHANGELOG.txt:191:- Fixed a bug in Credentials.ps1
C:\Users\Administrator\Desktop\log.txt:34:nishang-master\CHANGELOG.txt:195:- Credentials payload now validates both local and AD crdentials.
If creds entered could not be validated
C:\Users\Administrator\Desktop\log.txt:35:locally or at AD, credential prompt is shown again.
C:\Users\Administrator\Desktop\log.txt:36:nishang-master\CHANGELOG.txt:208:- Removed delay in the credentials payload's prompt. Now the
prompt asking for credentials will keep
C:\Users\Administrator\Desktop\log.txt:38:nishang-master\CHANGELOG.txt:210:- Removed hard coded credentials from Credentials.ps1 :| and
edited the code to accept user input.
C:\Users\Administrator\Desktop\log.txt:39:PowerSploit-master\Recon\Dictionaries\generic.txt:969:password/
C:\Users\Administrator\Desktop\log.txt:40:PowerSploit-master\Recon\Dictionaries\generic.txt:970:passwords/
C:\Users\Administrator\Desktop\log.txt:41:SEC505-Scripts\Laptop-Setup-README-NOW.txt:46:Note: The script will reset your password to
"P@ssword" inside the VM.
C:\Users\Administrator\Desktop\log.txt:42:SEC505-Scripts\Day1-PowerShell\Examples\signatures.txt:17:iisadmpwd Attempts to
access the IIS 4.0 change password scripts
C:\Users\Administrator\Desktop\log.txt:44:SEC505-Scripts\Day1-PowerShell\Examples\signatures.txt:47:/\~.+|\%2f\%7e Attempts
to use a /~ in a request (possible username
C:\Users\Administrator\Desktop\log.txt:46:SEC505-Scripts\Day1-PowerShell\Misc\Sample_PowerShell_Transcript_Log.txt:4:Username:
TESTING\TestUser47
C:\Users\Administrator\Desktop\log.txt:47:SEC505-Scripts\Day2-Hardening\IIS\Log_Analysis\Signatures.txt:17:iisadmpwd Attempts
to access the IIS 4.0 change password
C:\Users\Administrator\Desktop\log.txt:50:username search).
C:\Users\Administrator\Desktop\log.txt:51:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:4:The passwords of local administrative
accounts should be changed regularly and these
C:\Users\Administrator\Desktop\log.txt:52:passwords should be different from one computer to the next. But how can this been done securely
and conveniently? How can this be done
C:\Users\Administrator\Desktop\log.txt:54:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:15:Copy the Update-PasswordArchive.ps1
script into that shared folder (\\server\share).
C:\Users\Administrator\Desktop\log.txt:55:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:17:Using Group Policy, SCCM, a third-party
EMS, SCHTASKS.EXE or some other technique,
C:\Users\Administrator\Desktop\log.txt:57:command: "powershell.exe \\server\share\update-passwordarchive.ps1 -certificatefilepath
\\server\share\cert.cer -passwordarchivepath
C:\Users\Administrator\Desktop\log.txt:58:\\server\share -localusername administrator". This resets the password on the local Administrator
account, or whatever account is
C:\Users\Administrator\Desktop\log.txt:59:specified, with a 15-25 character, random complex password. The password is encrypted in memory
with the public key of the certificate
C:\Users\Administrator\Desktop\log.txt:61:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:19:When a password for a computer (laptop47)
needs to be recovered, the trusted
C:\Users\Administrator\Desktop\log.txt:62:administrator should run from their own local computer the following PowerShell script:
"recover-passwordarchive.ps1 -passwordarchivepath
C:\Users\Administrator\Desktop\log.txt:63:\\server\share -computername laptop47 -username helpdesk". This downloads the necessary encrypted
files and decrypts them locally in memory
C:\Users\Administrator\Desktop\log.txt:64:using the private key of the administrator, displaying the plaintext password within PowerShell.
C:\Users\Administrator\Desktop\log.txt:65:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:26:PowerShell 2.0 or later must be installed
on both the computer with the local user
C:\Users\Administrator\Desktop\log.txt:66:account whose password is to be reset and also on the administrators' computers who will recover
these passwords in plaintext.
C:\Users\Administrator\Desktop\log.txt:67:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:28:The Update-PasswordArchive.ps1 script,
which resets the password, must run with
C:\Users\Administrator\Desktop\log.txt:69:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:41:Copy the \Day2-DAC\UpdatePasswords folder
to your hard drive.
C:\Users\Administrator\Desktop\log.txt:70:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:43:In File Explorer, double-click the
"Password-is-password.pfx" file to import the
C:\Users\Administrator\Desktop\log.txt:71:test certificate and private key into your current user store (accept all the defaults). The
password is...password.
C:\Users\Administrator\Desktop\log.txt:72:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:45:Open PowerShell with administrative
privileges and run this command to reset the
C:\Users\Administrator\Desktop\log.txt:73:password on the Guest account:
C:\Users\Administrator\Desktop\log.txt:74:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:47: .\Update-PasswordArchive.ps1
-LocalUserName Guest -CertificateFilePath
C:\Users\Administrator\Desktop\log.txt:76:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:53:If you open the file in Notepad or a hex
editor, you'll see that it has been
C:\Users\Administrator\Desktop\log.txt:78:user certificate store, hence, you can use your private key to extract the password from the
encrypted file. Unless hackers have stolen
C:\Users\Administrator\Desktop\log.txt:79:your private key, they will not be able to decrypt the file and obtain the password inside it.
C:\Users\Administrator\Desktop\log.txt:80:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:55:To obtain the plaintext password, run
this command:
C:\Users\Administrator\Desktop\log.txt:81:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:57: .\Recover-PasswordArchive.ps1
-ComputerName $env:computername -UserName Guest
C:\Users\Administrator\Desktop\log.txt:82:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:59:The output is an object with the
plaintext password and other properties, similar
C:\Users\Administrator\Desktop\log.txt:84:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:63: UserName : Guest
C:\Users\Administrator\Desktop\log.txt:85:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:68: Password : b4EAti!HiLX]QI2
C:\Users\Administrator\Desktop\log.txt:86:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:70:The password property can now be piped
into other commands or copied into the
C:\Users\Administrator\Desktop\log.txt:88:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:74: get-help -full
.\Update-PasswordArchive.ps1
C:\Users\Administrator\Desktop\log.txt:89:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:81:The password is never sent over the
network in plaintext, never saved to disk in
C:\Users\Administrator\Desktop\log.txt:90:plaintext, and never exposed as a command-line argument, either when resetting the password or
when recovering it later. The new password
C:\Users\Administrator\Desktop\log.txt:91:is generated randomly in the memory of the PowerShell process running on the computer where the
password is reset. The process runs for
C:\Users\Administrator\Desktop\log.txt:93:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:83:Different certificates can be used at
different times, as long as their private
C:\Users\Administrator\Desktop\log.txt:94:keys are available to the administrator. When recovering a password, the correct certificate and
private key will be used automatically. A
C:\Users\Administrator\Desktop\log.txt:96:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:85:If the shared folder is not accessible to
the computer when the scheduled job runs,
C:\Users\Administrator\Desktop\log.txt:97:the password is not reset.
C:\Users\Administrator\Desktop\log.txt:98:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:87:If multiple administrators must be able
to recover the plaintext passwords, export
C:\Users\Administrator\Desktop\log.txt:102:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:91:The update script writes to the
Application event log whenever and wherever the
C:\Users\Administrator\Desktop\log.txt:103:script is run (Source: PasswordArchive, Event ID: 9013).
C:\Users\Administrator\Desktop\log.txt:104:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:93:The script can only be used to reset the
passwords of local accounts, not domain
C:\Users\Administrator\Desktop\log.txt:106:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:100:Keep the private key for the
certificate used to encrypt the password archive
C:\Users\Administrator\Desktop\log.txt:108:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:102:If the private key for the certificate
is compromised, create a new key pair,
C:\Users\Administrator\Desktop\log.txt:110:Policy, SCHTASKS.EXE or some other technique. Once all passwords have been changed, the fact
that the old private key has been compromised
C:\Users\Administrator\Desktop\log.txt:111:does not mean any current passwords are known.
C:\Users\Administrator\Desktop\log.txt:112:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:104:Use an RSA public key which is 2048
bits or larger. The public key encrypts a
C:\Users\Administrator\Desktop\log.txt:113:random 256-bit Rijndael key, which encrypts the password. Every file has a different Rijndael
key. RSA and Rijndael are used for maximum
C:\Users\Administrator\Desktop\log.txt:115:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:106:Prevent modification of the
Update-PasswordArchive.ps1 script itself by digitally
C:\Users\Administrator\Desktop\log.txt:118:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:108:Attackers may try to corrupt or delete
the existing password archive files to
C:\Users\Administrator\Desktop\log.txt:119:prevent access to current passwords. Each archive file contains an encrypted SHA256 hash of the
username, computername and password in that
C:\Users\Administrator\Desktop\log.txt:120:file in order to detect modified or damaged bits; the hash is checked whenever a password is
recovered.
C:\Users\Administrator\Desktop\log.txt:121:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:127:An attacker might try to generate
millions of spoofed archive files and add them
C:\Users\Administrator\Desktop\log.txt:126:machines. Besides, the benefit to us of managing local administrative account passwords
correctly far exceeds the potential negative of
C:\Users\Administrator\Desktop\log.txt:128:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:136:The output of the
Recover-PasswordArchive.ps1 script can be piped into other
C:\Users\Administrator\Desktop\log.txt:129:scripts to automate other tasks which require the plaintext password, such as executing commands,
doing WMI queries, opening an RDP session,
C:\Users\Administrator\Desktop\log.txt:130:or immediately resetting the password again when finished.
C:\Users\Administrator\Desktop\log.txt:131:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:138:When recovering a password, you can
pipe the password into the built-in clip.exe
C:\Users\Administrator\Desktop\log.txt:132:utility to put the password into the clipboard, like this:
C:\Users\Administrator\Desktop\log.txt:133:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:140:
\\controller\password-archives\Recover-PasswordArchive.ps1 `
C:\Users\Administrator\Desktop\log.txt:134:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:141: -PasswordArchivePath
\\controller\password-archives -ComputerName laptop47 `
C:\Users\Administrator\Desktop\log.txt:135:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:142: -UserName Administrator |
select-object -expandproperty password | clip.exe
C:\Users\Administrator\Desktop\log.txt:136:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:144:Keep the number of files in the archive
folder manageable by using the
C:\Users\Administrator\Desktop\log.txt:137:CleanUp-PasswordArchives.ps1 script. Perhaps running this script as a scheduled job every two or
four weeks.
C:\Users\Administrator\Desktop\log.txt:138:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:146:To optimize the performance of the
Recover-PasswordArchive.ps1 script when there
C:\Users\Administrator\Desktop\log.txt:139:are more than 100,000 files in the folder containing the password archives, disable 8.3 file name
generation and strip all current 8.3 names
C:\Users\Administrator\Desktop\log.txt:141:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:150:You can also perform an immediate
password update with commands wrapped in a
C:\Users\Administrator\Desktop\log.txt:143:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:153: Invoke-Command -ComputerName
laptop47 -filepath .\Update-PasswordArchive.ps1
C:\Users\Administrator\Desktop\log.txt:145:SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:158:The above Invoke-Command can be done by
specifying UNC paths instead, but this
C:\Users\Administrator\Desktop\log.txt:146:requires delegation of credentials to the remote computer, which is not ideal for limiting token
abuse attacks, so the certificate and
C:\Users\Administrator\Desktop\log.txt:148:SEC505-Scripts\Day6-Servers\Event_Log_ID_Numbers.txt:23:529 = Logon Failure: Unknown user name or
bad password
C:\Users\Administrator\Desktop\log.txt:149:SEC505-Scripts\Day6-Servers\Event_Log_ID_Numbers.txt:29:535 = The specified account's password
has expired
C:\Users\Administrator\Desktop\log.txt:150:SEC505-Scripts\Day6-Servers\Event_Log_ID_Numbers.txt:72:627 = Change Password Attempt
C:\Users\Administrator\Desktop\log.txt:151:SEC505-Scripts\Day6-Servers\Event_Log_ID_Numbers.txt:73:628 = User Account password set
C:\Users\Administrator\Desktop\log.txt:152:SEC505-Scripts\Day6-Servers\Kali-Linux-CheatSheet.txt:6:Default username is "root", password is
"toor".
C:\Users\Administrator\Desktop\log.txt:153:SEC505-Scripts\Day6-Servers\Kali-Linux-CheatSheet.txt:63: Password, User and Group Management
C:\Users\Administrator\Desktop\log.txt:154:SEC505-Scripts\Day6-Servers\Kali-Linux-CheatSheet.txt:65:passwd <username>
C:\Users\Administrator\Desktop\log.txt:155:SEC505-Scripts\Day6-Servers\Kali-Linux-CheatSheet.txt:67:id [<username>]
C:\Users\Administrator\Desktop\log.txt:156:SEC505-Scripts\Day6-Servers\Kali-Linux-CheatSheet.txt:69:adduser <username>
C:\Users\Administrator\Desktop\log.txt:157:SEC505-Scripts\Day6-Servers\Kali-Linux-CheatSheet.txt:70:deluser <username>
C:\Users\Administrator\Desktop\log.txt:158:SEC505-Scripts\Day6-Servers\Kali-Linux-CheatSheet.txt:139:smbclient -U <username> -W <domain>
//server/share
C:\Users\Administrator\Desktop\log.txt:159:SEC505-Scripts\Day6-Servers\Kali-Linux-CheatSheet.txt:140:smbclient -U <username> -W <domain>
//server/share "<passphrase>"
C:\Users\Administrator\Desktop\log.txt:160:SEC505-Scripts\Day6-Servers\Kali-Linux-CheatSheet.txt:245:# To install meterpreter with a
username and password/hash:
C:\Users\Administrator\Desktop\log.txt:161:SEC505-Scripts\Day6-Servers\Kerberos\License.txt:14:MEMBER ACCOUNT, PASSWORD, AND SECURITY
C:\Users\Administrator\Desktop\log.txt:162:SEC505-Scripts\Day6-Servers\Kerberos\License.txt:56:MEMBER ACCOUNT, PASSWORD, AND SECURITY
C:\Users\Administrator\Desktop\log.txt:165:are entirely responsible for maintaining the confidentiality of your password and account.
Furthermore, you are entirely responsible for any
C:\Users\Administrator\Desktop\log.txt:167:other breach of security. Microsoft will not be liable for any loss that you may incur as a
result of someone else using your password or
C:\Users\Administrator\Desktop\log.txt:169:someone else using your account or password. You may not use anyone else's account without the
permission of the account holder.
C:\Users\Administrator\Desktop\log.txt:174:connected to any Microsoft server or to any of the Services, through hacking, password mining or
any other means. You may not obtain or
C:\Users\Administrator\Desktop\log.txt:176:SEC505-Scripts\Day6-Servers\Kerberos\README.txt:1:This folder contains a PowerShell script to
reset the password of
C:\Users\Administrator\Desktop\log.txt:177:SEC505-Scripts\Extras\VBScript\passwords.txt:1:password
C:\Users\Administrator\Desktop\log.txt:178:SEC505-Scripts\Extras\VBScript\signatures.txt:17:iisadmpwd attempts to access the
IIS 4.0 change password scripts
C:\Users\Administrator\Desktop\log.txt:180:SEC505-Scripts\Extras\VBScript\signatures.txt:47:/\~.+|\%2f\%7e attempts to use a
/~ in a request (possible username search).
C:\Users\Administrator\Desktop\log.txt:182:Sysinternals tools may include personally identifiable or other sensitive information (such as
usernames, passwords, paths to files
C:\Users\Administrator\Desktop\log.txt:185:SysinternalsSuite\readme.txt:18:Autologon - Bypass password screen during logon.
C:\Users\Administrator\Desktop\log.txt:186:SysinternalsSuite\readme.txt:102:PsPasswd - Changes account passwords.
C:\Users\Administrator\Desktop\log.txt:187:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Automatic_Variables.help.txt:109:
typically C:\Users\<UserName>.
C:\Users\Administrator\Desktop\log.txt:188:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Functions_Advanced_Parameters.help.txt:181:
parameter set, a UserName
C:\Users\Administrator\Desktop\log.txt:190:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Functions_Advanced_Parameters.help.txt:194:
$UserName,
C:\Users\Administrator\Desktop\log.txt:191:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Functions_Advanced_Parameters.help.txt:220:
$UserName,
C:\Users\Administrator\Desktop\log.txt:192:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Functions_Advanced_Parameters.help.txt:561:
$UserName
C:\Users\Administrator\Desktop\log.txt:193:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Functions_OutputTypeAttribute.help.txt:133:
$UserName
C:\Users\Administrator\Desktop\log.txt:195:credentials. It
C:\Users\Administrator\Desktop\log.txt:196:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Jobs.help.txt:305: credentials to run
the command. The value of the Reason
C:\Users\Administrator\Desktop\log.txt:198:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Language_Modes.help.txt:172:
PSCredential
C:\Users\Administrator\Desktop\log.txt:199:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Pipelines.help.txt:367:
Parameter [Credential] PIPELINE INPUT
C:\Users\Administrator\Desktop\log.txt:201:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Preference_Variables.help.txt:1084:
ProxyCredential :
C:\Users\Administrator\Desktop\log.txt:203:credentials of a member of
C:\Users\Administrator\Desktop\log.txt:204:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_PSSession_Details.help.txt:142: only if
you can supply the credentials of the user
C:\Users\Administrator\Desktop\log.txt:206:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_PSSession_Details.help.txt:144:
includes RunAs credentials. Otherwise, you can
C:\Users\Administrator\Desktop\log.txt:209:credentials that were used
C:\Users\Administrator\Desktop\log.txt:211:credentials of
C:\Users\Administrator\Desktop\log.txt:212:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_FAQ.help.txt:63: name and
password credentials on the local computer or the
C:\Users\Administrator\Desktop\log.txt:213:credentials
C:\Users\Administrator\Desktop\log.txt:214:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_FAQ.help.txt:65: The credentials
and the rest of the transmission are
C:\Users\Administrator\Desktop\log.txt:216:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_FAQ.help.txt:513: to use the
Credential parameter of the Invoke-Command,
C:\Users\Administrator\Desktop\log.txt:218:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_FAQ.help.txt:514: or
Enter-PSSession cmdlets to provide the credentials of
C:\Users\Administrator\Desktop\log.txt:220:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_FAQ.help.txt:521: credentials.
C:\Users\Administrator\Desktop\log.txt:221:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Requirements.help.txt:62:
provide the credentials of an administrator.
C:\Users\Administrator\Desktop\log.txt:223:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:273:
HOW TO PROVIDE ADMINISTRATOR CREDENTIALS
C:\Users\Administrator\Desktop\log.txt:224:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:279:
computer. Credentials are sometimes required
C:\Users\Administrator\Desktop\log.txt:226:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:283:
computer, or can provide the credentials of a
C:\Users\Administrator\Desktop\log.txt:228:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:284:
group, use the Credential parameter of the
C:\Users\Administrator\Desktop\log.txt:231:the credentials of an
C:\Users\Administrator\Desktop\log.txt:233:-Credential Domain01\Admin01
C:\Users\Administrator\Desktop\log.txt:234:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:292:
For more information about the Credential
C:\Users\Administrator\Desktop\log.txt:236:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:374: 2.
Use the Credential parameter in all remote
C:\Users\Administrator\Desktop\log.txt:239:submitting the credentials
C:\Users\Administrator\Desktop\log.txt:240:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:400: 2.
Verify that a password is set on the
C:\Users\Administrator\Desktop\log.txt:242:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:401:
password is not set or the password value
C:\Users\Administrator\Desktop\log.txt:244:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:404:
To set password for your user account, use
C:\Users\Administrator\Desktop\log.txt:246:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:408: 3.
Use the Credential parameter in all remote
C:\Users\Administrator\Desktop\log.txt:249:submitting the credentials
C:\Users\Administrator\Desktop\log.txt:250:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:544:
-- ProxyCredential
C:\Users\Administrator\Desktop\log.txt:252:ProxyAuthentication, and ProxyCredential
C:\Users\Administrator\Desktop\log.txt:254:-ProxyCredential Domain01\User01
C:\Users\Administrator\Desktop\log.txt:255:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Return.help.txt:44: function
ScreenPassword($instance)
C:\Users\Administrator\Desktop\log.txt:257:ScreenPassword($a) }
C:\Users\Administrator\Desktop\log.txt:258:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Return.help.txt:53: This script
checks each user account. The ScreenPassword
C:\Users\Administrator\Desktop\log.txt:261:password-protected
C:\Users\Administrator\Desktop\log.txt:262:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Return.help.txt:55: screen saver. If
the screen saver is password protected, the
C:\Users\Administrator\Desktop\log.txt:264:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Scopes.help.txt:529: $Cred =
Get-Credential
C:\Users\Administrator\Desktop\log.txt:265:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Scopes.help.txt:530:
Invoke-Command $s {Remove-Item .\Test*.ps1 -Credential
C:\Users\Administrator\Desktop\log.txt:267:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Scopes.help.txt:537: $Cred =
Get-Credential
C:\Users\Administrator\Desktop\log.txt:269:-Credential $c} -ArgumentList $Cred
C:\Users\Administrator\Desktop\log.txt:270:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Script_Internationalization.help.txt:157:if
(!($username)) { $msgTable.promptMsg }
C:\Users\Administrator\Desktop\log.txt:272:can supply the credentials of a
C:\Users\Administrator\Desktop\log.txt:273:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Session_Configuration_Files.help.txt:230:
RunAsPassword
C:\Users\Administrator\Desktop\log.txt:274:NoteProperty System.String RunAsPassword=
C:\Users\Administrator\Desktop\log.txt:276:password. The
C:\Users\Administrator\Desktop\log.txt:277:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:174: password ensures
that no one can use or access the
C:\Users\Administrator\Desktop\log.txt:279:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:175: your consent.
Create and enter a password that you can
C:\Users\Administrator\Desktop\log.txt:281:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:176: use this password
later to retrieve the certificate.
C:\Users\Administrator\Desktop\log.txt:282:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:277: 6. Type a
password, and then type it again to confirm.
C:\Users\Administrator\Desktop\log.txt:283:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:293: 4. On the
Password page, select "Enable strong private
C:\Users\Administrator\Desktop\log.txt:285:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:294: and then
enter the password that you assigned during
C:\Users\Administrator\Desktop\log.txt:288:UseDefaultCredentials
C:\Users\Administrator\Desktop\log.txt:289:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Updatable_Help.help.txt:157: parameter
that provides the explicit credentials of
C:\Users\Administrator\Desktop\log.txt:292:Credential
C:\Users\Administrator\Desktop\log.txt:293:C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Updatable_Help.help.txt:164: Credential
parameter is valid only when you use the
C:\Users\Administrator\Desktop\log.txt:295:C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory.hel
p.txt:32: Account and Password Policy
C:\Users\Administrator\Desktop\log.txt:298:Remove-ADFineGrainedPasswordPolicy.
C:\Users\Administrator\Desktop\log.txt:300:bad password count greater than five:
C:\Users\Administrator\Desktop\log.txt:302:ADFineGrainedPasswordPolicy
C:\Users\Administrator\Desktop\log.txt:304:(sAMUserName)
C:\Users\Administrator\Desktop\log.txt:306:ADFineGrainedPasswordPolicy
C:\Users\Administrator\Desktop\log.txt:308:ADDefaultDomainPasswordPolicy
C:\Users\Administrator\Desktop\log.txt:310:ADFineGrainedPasswordPolicy
C:\Users\Administrator\Desktop\log.txt:312:fine grained password policy object; that is, an AD
C:\Users\Administrator\Desktop\log.txt:314:msDS-PasswordSettings in AD DS and is derived from
C:\Users\Administrator\Desktop\log.txt:316:ADFineGrainedPasswordPolicy may contain the following properties in
C:\Users\Administrator\Desktop\log.txt:318:attribute: msDS-PasswordComplexityEnabled
C:\Users\Administrator\Desktop\log.txt:319:C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_Obj
ectModel.help.txt:215: MaxPasswordAge
C:\Users\Administrator\Desktop\log.txt:322:attribute: msDS-MaximumPasswordAge
C:\Users\Administrator\Desktop\log.txt:323:C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_Obj
ectModel.help.txt:218: MinPasswordAge
C:\Users\Administrator\Desktop\log.txt:326:attribute: msDS-MinimumPasswordAge
C:\Users\Administrator\Desktop\log.txt:328:MinPasswordLength - A property of type System.Int32, derived from the
C:\Users\Administrator\Desktop\log.txt:330:attribute: msDS-MinimumPasswordLength
C:\Users\Administrator\Desktop\log.txt:332:PasswordHistoryCount - A property of type System.Int32, derived from
C:\Users\Administrator\Desktop\log.txt:334:attribute: msDS-PasswordHistoryLength
C:\Users\Administrator\Desktop\log.txt:336:attribute: msDS-PasswordSettingsPrecedence
C:\Users\Administrator\Desktop\log.txt:338:msDS-PasswordReversibleEncryptionEnabled
C:\Users\Administrator\Desktop\log.txt:340:AllowReversiblePasswordEncryption - A property of type System.Boolean,
C:\Users\Administrator\Desktop\log.txt:342:ms-DS-UserEncryptedTextPasswordAllowed
C:\Users\Administrator\Desktop\log.txt:344:CannotChangePassword - A property of type System.Boolean, derived from
C:\Users\Administrator\Desktop\log.txt:346:LastBadPasswordAttempt - A property of type System.DateTime, derived
C:\Users\Administrator\Desktop\log.txt:348:directory attribute: badPasswordTime
C:\Users\Administrator\Desktop\log.txt:350:PasswordExpired - A property of type System.Boolean, for AD DS it is
C:\Users\Administrator\Desktop\log.txt:352:attribute msDS-UserPasswordExpired
C:\Users\Administrator\Desktop\log.txt:354:PasswordLastSet - A property of type System.DateTime, derived from the
C:\Users\Administrator\Desktop\log.txt:356:PasswordNeverExpires - A property of type System.Boolean, for AD LDS
C:\Users\Administrator\Desktop\log.txt:358:attribute: msDS-UserDontExpirePassword
C:\Users\Administrator\Desktop\log.txt:360:PasswordNotRequired - A property of type System.Boolean, for AD DS it
C:\Users\Administrator\Desktop\log.txt:362:attribute: ms-DS-UserPasswordNotRequired
C:\Users\Administrator\Desktop\log.txt:364:ADDefaultDomainPasswordPolicy
C:\Users\Administrator\Desktop\log.txt:366:domain-wide password policy of an Active Directory
C:\Users\Administrator\Desktop\log.txt:368:ADDefaultDomainPasswordPolicy may contain the following properties
C:\Users\Administrator\Desktop\log.txt:369:C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_Obj
ectModel.help.txt:721: MaxPasswordAge
C:\Users\Administrator\Desktop\log.txt:371:C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_Obj
ectModel.help.txt:724: MinPasswordAge
C:\Users\Administrator\Desktop\log.txt:374:MinPasswordLength - A property of type System.Int32, derived from the
C:\Users\Administrator\Desktop\log.txt:376:PasswordHistoryCount - A property of type System.Int32, derived from
C:\Users\Administrator\Desktop\log.txt:378:C:\Users\<UserName>\AppData\Local\Microsoft\Windows\PowerShell\ScheduledJob
C:\Users\Administrator\Desktop\log.txt:380:permissions of the user who is specified by the Credential
C:\Users\Administrator\Desktop\log.txt:382:C:\Users\<UserName>\AppData\Local\Microsoft\Windows\PowerShell
C:\Users\Administrator\Desktop\log.txt:383:C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_ActivityCommonParameters
.help.txt:55: PSCredential
C:\Users\Administrator\Desktop\log.txt:384:C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_ActivityCommonParameters
.help.txt:216: user's credentials
C:\Users\Administrator\Desktop\log.txt:387:NegotiateWithImplicitCredential. The default
C:\Users\Administrator\Desktop\log.txt:388:C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_ActivityCommonParameters
.help.txt:227: CAUTION: Credential
C:\Users\Administrator\Desktop\log.txt:391:which the user's credentials are passed
C:\Users\Administrator\Desktop\log.txt:393:computer is compromised, the credentials that
C:\Users\Administrator\Desktop\log.txt:395:command must include the PSCredential
C:\Users\Administrator\Desktop\log.txt:396:C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_ActivityCommonParameters
.help.txt:336: -PSCredential
C:\Users\Administrator\Desktop\log.txt:397:<PSCredential>
C:\Users\Administrator\Desktop\log.txt:399:that contains a PSCredential object,
C:\Users\Administrator\Desktop\log.txt:401:Get-Credential cmdlet returns. If
C:\Users\Administrator\Desktop\log.txt:402:C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_ActivityCommonParameters
.help.txt:348: password.
C:\Users\Administrator\Desktop\log.txt:404:PSCredential. The PS-prefixed parameters configure
C:\Users\Administrator\Desktop\log.txt:406:mechanism that is used to authenticate the user's credentials
C:\Users\Administrator\Desktop\log.txt:408:Kerberos, Negotiate, and NegotiateWithImplicitCredential.
C:\Users\Administrator\Desktop\log.txt:409:C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_WorkflowCommonParameters
.help.txt:102: CAUTION: Credential
C:\Users\Administrator\Desktop\log.txt:412:credentials are passed to a remote computer to be
C:\Users\Administrator\Desktop\log.txt:414:credentials that are passed to it can be used to control
C:\Users\Administrator\Desktop\log.txt:416:the PSCredential parameter. Also, the computer must be
C:\Users\Administrator\Desktop\log.txt:417:C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_WorkflowCommonParameters
.help.txt:209: -PSCredential
C:\Users\Administrator\Desktop\log.txt:418:<PSCredential>
C:\Users\Administrator\Desktop\log.txt:420:contains a PSCredential object, such as one that the
C:\Users\Administrator\Desktop\log.txt:421:C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_WorkflowCommonParameters
.help.txt:216: Get-Credential
C:\Users\Administrator\Desktop\log.txt:424:password.
C:\Users\Administrator\Desktop\log.txt:425:C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_Workflows.help.txt:157:
-Credential
C:\Users\Administrator\Desktop\log.txt:427:C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_Workflows.help.txt:174:
-Credential
C:\Users\Administrator\Desktop\log.txt:429:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Automatic_Variables.help.txt:109:
typically C:\Users\<UserName>.
C:\Users\Administrator\Desktop\log.txt:430:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Functions_Advanced_Parameters.help.txt:181:
parameter set, a UserName
C:\Users\Administrator\Desktop\log.txt:432:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Functions_Advanced_Parameters.help.txt:194:
$UserName,
C:\Users\Administrator\Desktop\log.txt:433:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Functions_Advanced_Parameters.help.txt:220:
$UserName,
C:\Users\Administrator\Desktop\log.txt:434:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Functions_Advanced_Parameters.help.txt:561:
$UserName
C:\Users\Administrator\Desktop\log.txt:435:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Functions_OutputTypeAttribute.help.txt:133:
$UserName
C:\Users\Administrator\Desktop\log.txt:437:credentials. It
C:\Users\Administrator\Desktop\log.txt:438:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Jobs.help.txt:305: credentials to run
the command. The value of the Reason
C:\Users\Administrator\Desktop\log.txt:440:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Language_Modes.help.txt:172:
PSCredential
C:\Users\Administrator\Desktop\log.txt:441:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Pipelines.help.txt:367:
Parameter [Credential] PIPELINE INPUT
C:\Users\Administrator\Desktop\log.txt:443:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Preference_Variables.help.txt:1084:
ProxyCredential :
C:\Users\Administrator\Desktop\log.txt:445:credentials of a member of
C:\Users\Administrator\Desktop\log.txt:446:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_PSSession_Details.help.txt:142: only if
you can supply the credentials of the user
C:\Users\Administrator\Desktop\log.txt:448:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_PSSession_Details.help.txt:144:
includes RunAs credentials. Otherwise, you can
C:\Users\Administrator\Desktop\log.txt:451:credentials that were used
C:\Users\Administrator\Desktop\log.txt:453:credentials of
C:\Users\Administrator\Desktop\log.txt:454:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_FAQ.help.txt:63: name and
password credentials on the local computer or the
C:\Users\Administrator\Desktop\log.txt:455:credentials
C:\Users\Administrator\Desktop\log.txt:456:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_FAQ.help.txt:65: The credentials
and the rest of the transmission are
C:\Users\Administrator\Desktop\log.txt:458:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_FAQ.help.txt:513: to use the
Credential parameter of the Invoke-Command,
C:\Users\Administrator\Desktop\log.txt:460:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_FAQ.help.txt:514: or
Enter-PSSession cmdlets to provide the credentials of
C:\Users\Administrator\Desktop\log.txt:462:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_FAQ.help.txt:521: credentials.
C:\Users\Administrator\Desktop\log.txt:463:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Requirements.help.txt:62:
provide the credentials of an administrator.
C:\Users\Administrator\Desktop\log.txt:465:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:273:
HOW TO PROVIDE ADMINISTRATOR CREDENTIALS
C:\Users\Administrator\Desktop\log.txt:466:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:279:
computer. Credentials are sometimes required
C:\Users\Administrator\Desktop\log.txt:468:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:283:
computer, or can provide the credentials of a
C:\Users\Administrator\Desktop\log.txt:470:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:284:
group, use the Credential parameter of the
C:\Users\Administrator\Desktop\log.txt:473:the credentials of an
C:\Users\Administrator\Desktop\log.txt:475:-Credential Domain01\Admin01
C:\Users\Administrator\Desktop\log.txt:476:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:292:
For more information about the Credential
C:\Users\Administrator\Desktop\log.txt:478:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:374: 2.
Use the Credential parameter in all remote
C:\Users\Administrator\Desktop\log.txt:481:submitting the credentials
C:\Users\Administrator\Desktop\log.txt:482:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:400: 2.
Verify that a password is set on the
C:\Users\Administrator\Desktop\log.txt:484:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:401:
password is not set or the password value
C:\Users\Administrator\Desktop\log.txt:486:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:404:
To set password for your user account, use
C:\Users\Administrator\Desktop\log.txt:488:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:408: 3.
Use the Credential parameter in all remote
C:\Users\Administrator\Desktop\log.txt:491:submitting the credentials
C:\Users\Administrator\Desktop\log.txt:492:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:544:
-- ProxyCredential
C:\Users\Administrator\Desktop\log.txt:494:ProxyAuthentication, and ProxyCredential
C:\Users\Administrator\Desktop\log.txt:496:-ProxyCredential Domain01\User01
C:\Users\Administrator\Desktop\log.txt:497:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Return.help.txt:44: function
ScreenPassword($instance)
C:\Users\Administrator\Desktop\log.txt:499:ScreenPassword($a) }
C:\Users\Administrator\Desktop\log.txt:500:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Return.help.txt:53: This script
checks each user account. The ScreenPassword
C:\Users\Administrator\Desktop\log.txt:503:password-protected
C:\Users\Administrator\Desktop\log.txt:504:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Return.help.txt:55: screen saver. If
the screen saver is password protected, the
C:\Users\Administrator\Desktop\log.txt:506:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Scopes.help.txt:529: $Cred =
Get-Credential
C:\Users\Administrator\Desktop\log.txt:507:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Scopes.help.txt:530:
Invoke-Command $s {Remove-Item .\Test*.ps1 -Credential
C:\Users\Administrator\Desktop\log.txt:509:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Scopes.help.txt:537: $Cred =
Get-Credential
C:\Users\Administrator\Desktop\log.txt:511:-Credential $c} -ArgumentList $Cred
C:\Users\Administrator\Desktop\log.txt:512:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Script_Internationalization.help.txt:157:if
(!($username)) { $msgTable.promptMsg }
C:\Users\Administrator\Desktop\log.txt:514:can supply the credentials of a
C:\Users\Administrator\Desktop\log.txt:515:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Session_Configuration_Files.help.txt:230:
RunAsPassword
C:\Users\Administrator\Desktop\log.txt:516:NoteProperty System.String RunAsPassword=
C:\Users\Administrator\Desktop\log.txt:518:password. The
C:\Users\Administrator\Desktop\log.txt:519:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:174: password ensures
that no one can use or access the
C:\Users\Administrator\Desktop\log.txt:521:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:175: your consent.
Create and enter a password that you can
C:\Users\Administrator\Desktop\log.txt:523:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:176: use this password
later to retrieve the certificate.
C:\Users\Administrator\Desktop\log.txt:524:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:277: 6. Type a
password, and then type it again to confirm.
C:\Users\Administrator\Desktop\log.txt:525:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:293: 4. On the
Password page, select "Enable strong private
C:\Users\Administrator\Desktop\log.txt:527:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:294: and then
enter the password that you assigned during
C:\Users\Administrator\Desktop\log.txt:530:UseDefaultCredentials
C:\Users\Administrator\Desktop\log.txt:531:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Updatable_Help.help.txt:157: parameter
that provides the explicit credentials of
C:\Users\Administrator\Desktop\log.txt:534:Credential
C:\Users\Administrator\Desktop\log.txt:535:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Updatable_Help.help.txt:164: Credential
parameter is valid only when you use the
C:\Users\Administrator\Desktop\nishang-master\CHANGELOG.txt:32:- Added support for dumping cleartext credentials from RDP sessions for
Invoke-MimikatzWfigestDowngrade.
C:\Users\Administrator\Desktop\nishang-master\CHANGELOG.txt:49:- Removed hard coded credentials from Invoke-PSGcat.ps1 and Invoke-PSGcat in
Powerpreter. So embarrassing!
C:\Users\Administrator\Desktop\nishang-master\CHANGELOG.txt:74:- Credentials script renamed to Invoke-CredentialsPhish.
C:\Users\Administrator\Desktop\nishang-master\CHANGELOG.txt:186:- Fixed help in Credentials.ps1
C:\Users\Administrator\Desktop\nishang-master\CHANGELOG.txt:191:- Fixed a bug in Credentials.ps1
C:\Users\Administrator\Desktop\nishang-master\CHANGELOG.txt:195:- Credentials payload now validates both local and AD crdentials. If creds
entered could not be validated locally or at AD, credential prompt is shown again.
C:\Users\Administrator\Desktop\nishang-master\CHANGELOG.txt:208:- Removed delay in the credentials payload's prompt. Now the prompt asking
for credentials will keep appearing instantly if nothing is entered.
C:\Users\Administrator\Desktop\nishang-master\CHANGELOG.txt:210:- Removed hard coded credentials from Credentials.ps1 :| and edited the code
to accept user input.
C:\Users\Administrator\Desktop\PowerSploit-master\Recon\Dictionaries\generic.txt:969:password/
C:\Users\Administrator\Desktop\PowerSploit-master\Recon\Dictionaries\generic.txt:970:passwords/
C:\Users\Administrator\Desktop\SEC505-Scripts\Laptop-Setup-README-NOW.txt:46:Note: The script will reset your password to "P@ssword" inside
the VM.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day1-PowerShell\Examples\signatures.txt:17:iisadmpwd Attempts to access the IIS
4.0 change password scripts (reconnaissance).
C:\Users\Administrator\Desktop\SEC505-Scripts\Day1-PowerShell\Examples\signatures.txt:47:/\~.+|\%2f\%7e Attempts to use a /~
in a request (possible username search).
C:\Users\Administrator\Desktop\SEC505-Scripts\Day1-PowerShell\Misc\Sample_PowerShell_Transcript_Log.txt:4:Username: TESTING\TestUser47
C:\Users\Administrator\Desktop\SEC505-Scripts\Day2-Hardening\IIS\Log_Analysis\Signatures.txt:17:iisadmpwd Attempts to access
the IIS 4.0 change password scripts (reconnaissance).
C:\Users\Administrator\Desktop\SEC505-Scripts\Day2-Hardening\IIS\Log_Analysis\Signatures.txt:47:/\~.+|\%2f\%7e Attempts to
use a /~ in a request (possible username search).
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:4:The passwords of local administrative accounts should
be changed regularly and these passwords should be different from one computer to the next. But how can this been done securely and
conveniently? How can this be done for free?
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:15:Copy the Update-PasswordArchive.ps1 script into that
shared folder (\\server\share).
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:17:Using Group Policy, SCCM, a third-party EMS,
SCHTASKS.EXE or some other technique, create a scheduled job on every computer that runs once per week (or every night) under Local System
context that executes the following command: "powershell.exe \\server\share\update-passwordarchive.ps1 -certificatefilepath
\\server\share\cert.cer -passwordarchivepath \\server\share -localusername administrator". This resets the password on the local
Administrator account, or whatever account is specified, with a 15-25 character, random complex password. The password is encrypted in
memory with the public key of the certificate (cert.cer) and saved to an archive file to the specified share (\\server\share).
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:19:When a password for a computer (laptop47) needs to
be recovered, the trusted administrator should run from their own local computer the following PowerShell script:
"recover-passwordarchive.ps1 -passwordarchivepath \\server\share -computername laptop47 -username helpdesk". This downloads the necessary
encrypted files and decrypts them locally in memory using the private key of the administrator, displaying the plaintext password within
PowerShell.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:26:PowerShell 2.0 or later must be installed on both
the computer with the local user account whose password is to be reset and also on the administrators' computers who will recover these
passwords in plaintext.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:28:The Update-PasswordArchive.ps1 script, which resets
the password, must run with administrative or Local System privileges.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:41:Copy the \Day2-DAC\UpdatePasswords folder to your
hard drive.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:43:In File Explorer, double-click the
"Password-is-password.pfx" file to import the test certificate and private key into your current user store (accept all the defaults). The
password is...password.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:45:Open PowerShell with administrative privileges and
run this command to reset the password on the Guest account:
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:47: .\Update-PasswordArchive.ps1 -LocalUserName
Guest -CertificateFilePath .\PublicKeyCert.cer
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:53:If you open the file in Notepad or a hex editor,
you'll see that it has been encrypted with the public key in the PublicKeyCert.cer file. The private key for this public key has already
been imported into your local user certificate store, hence, you can use your private key to extract the password from the encrypted file.
Unless hackers have stolen your private key, they will not be able to decrypt the file and obtain the password inside it.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:55:To obtain the plaintext password, run this command:
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:57: .\Recover-PasswordArchive.ps1 -ComputerName
$env:computername -UserName Guest
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:59:The output is an object with the plaintext password
and other properties, similar to this:
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:63: UserName : Guest
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:68: Password : b4EAti!HiLX]QI2
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:70:The password property can now be piped into other
commands or copied into the wetware clipboard through your retinas.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:74: get-help -full .\Update-PasswordArchive.ps1
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:81:The password is never sent over the network in
plaintext, never saved to disk in plaintext, and never exposed as a command-line argument, either when resetting the password or when
recovering it later. The new password is generated randomly in the memory of the PowerShell process running on the computer where the
password is reset. The process runs for less than a second as Local System in the background.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:83:Different certificates can be used at different
times, as long as their private keys are available to the administrator. When recovering a password, the correct certificate and private
key will be used automatically. A smart card can be used too. The script has been successfully tested with the Common Access Card (CAC)
used by the U.S. military and DoD.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:85:If the shared folder is not accessible to the
computer when the scheduled job runs, the password is not reset.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:87:If multiple administrators must be able to recover
the plaintext passwords, export the relevant certificate and private key to a PFX file and import it into each administrator's local
profile. Because this is not a certificate used to uniquely identify a person or device, everyone on the help desk could have a copy of its
private key (though this increases the risk of private key exposure as more copies are distributed).
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:91:The update script writes to the Application event
log whenever and wherever the script is run (Source: PasswordArchive, Event ID: 9013).
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:93:The script can only be used to reset the passwords
of local accounts, not domain accounts in AD.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:100:Keep the private key for the certificate used to
encrypt the password archive files secure, such as on a smart card. This is the most important factor.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:102:If the private key for the certificate is
compromised, create a new key pair, replace the certificate file (.CER) in the shared folder, and immediately remotely trigger the scheduled
job on all machines using Group Policy, SCHTASKS.EXE or some other technique. Once all passwords have been changed, the fact that the old
private key has been compromised does not mean any current passwords are known.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:104:Use an RSA public key which is 2048 bits or larger.
The public key encrypts a random 256-bit Rijndael key, which encrypts the password. Every file has a different Rijndael key. RSA and
Rijndael are used for maximum backwards compatibility (using AES explicitly in the script requires .NET Framework 3.5 or later).
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:106:Prevent modification of the
Update-PasswordArchive.ps1 script itself by digitally signing the script, enforcing script signature requirements, and using restrictive
NTFS permissions. Only allow NTFS read access to the script to those identities (computer accounts) which need to run it. Use NTFS
auditing to track changes to the script.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:108:Attackers may try to corrupt or delete the existing
password archive files to prevent access to current passwords. Each archive file contains an encrypted SHA256 hash of the username,
computername and password in that file in order to detect modified or damaged bits; the hash is checked whenever a password is recovered.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:127:An attacker might try to generate millions of
spoofed archive files and add them to the shared folder. This is possible because the script and public key would be accessible to the
attacker too. Realistically, though, a DoS attack in which millions of new archive files are created would likely be of low value for the
attacker since it would be easy to detect, easy to log the name or IP of the machine creating the new files, easy to use timestamps in the
share to identify post-attack files, easy to recover from nightly or weekly backups, and the DoS attack would not allow the hacker to expand
their existing powers to new machines. Besides, the benefit to us of managing local administrative account passwords correctly far exceeds
the potential negative of this sort of DoS attack.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:136:The output of the Recover-PasswordArchive.ps1
script can be piped into other scripts to automate other tasks which require the plaintext password, such as executing commands, doing WMI
queries, opening an RDP session, or immediately resetting the password again when finished.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:138:When recovering a password, you can pipe the
password into the built-in clip.exe utility to put the password into the clipboard, like this:
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:140:
\\controller\password-archives\Recover-PasswordArchive.ps1 `
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:141: -PasswordArchivePath
\\controller\password-archives -ComputerName laptop47 `
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:142: -UserName Administrator | select-object
-expandproperty password | clip.exe
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:144:Keep the number of files in the archive folder
manageable by using the CleanUp-PasswordArchives.ps1 script. Perhaps running this script as a scheduled job every two or four weeks.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:146:To optimize the performance of the
Recover-PasswordArchive.ps1 script when there are more than 100,000 files in the folder containing the password archives, disable 8.3 file
name generation and strip all current 8.3 names on the volume containing that folder. Search the Internet on "fsutil.exe 8dot3name" to see
how.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:150:You can also perform an immediate password update
with commands wrapped in a function like the following:
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:153: Invoke-Command -ComputerName laptop47 -filepath
.\Update-PasswordArchive.ps1 -argumentlist "C:\publickeycert.cer","Administrator","c:\"
C:\Users\Administrator\Desktop\SEC505-Scripts\Day4-Admins\UpdatePasswords\README.txt:158:The above Invoke-Command can be done by specifying
UNC paths instead, but this requires delegation of credentials to the remote computer, which is not ideal for limiting token abuse attacks,
so the certificate and archive files should be copied back-and-forth manually. Besides, wrapped in a function, all these steps would be
hidden from us anyway.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day6-Servers\Event_Log_ID_Numbers.txt:23:529 = Logon Failure: Unknown user name or bad password
C:\Users\Administrator\Desktop\SEC505-Scripts\Day6-Servers\Event_Log_ID_Numbers.txt:29:535 = The specified account's password has expired
C:\Users\Administrator\Desktop\SEC505-Scripts\Day6-Servers\Event_Log_ID_Numbers.txt:72:627 = Change Password Attempt
C:\Users\Administrator\Desktop\SEC505-Scripts\Day6-Servers\Event_Log_ID_Numbers.txt:73:628 = User Account password set
C:\Users\Administrator\Desktop\SEC505-Scripts\Day6-Servers\Kali-Linux-CheatSheet.txt:6:Default username is "root", password is "toor".
C:\Users\Administrator\Desktop\SEC505-Scripts\Day6-Servers\Kali-Linux-CheatSheet.txt:63: Password, User and Group Management
C:\Users\Administrator\Desktop\SEC505-Scripts\Day6-Servers\Kali-Linux-CheatSheet.txt:65:passwd <username>
C:\Users\Administrator\Desktop\SEC505-Scripts\Day6-Servers\Kali-Linux-CheatSheet.txt:67:id [<username>]
C:\Users\Administrator\Desktop\SEC505-Scripts\Day6-Servers\Kali-Linux-CheatSheet.txt:69:adduser <username>
C:\Users\Administrator\Desktop\SEC505-Scripts\Day6-Servers\Kali-Linux-CheatSheet.txt:70:deluser <username>
C:\Users\Administrator\Desktop\SEC505-Scripts\Day6-Servers\Kali-Linux-CheatSheet.txt:139:smbclient -U <username> -W <domain> //server/share
C:\Users\Administrator\Desktop\SEC505-Scripts\Day6-Servers\Kali-Linux-CheatSheet.txt:140:smbclient -U <username> -W <domain> //server/share
"<passphrase>"
C:\Users\Administrator\Desktop\SEC505-Scripts\Day6-Servers\Kali-Linux-CheatSheet.txt:245:# To install meterpreter with a username and
password/hash:
C:\Users\Administrator\Desktop\SEC505-Scripts\Day6-Servers\Kerberos\License.txt:14:MEMBER ACCOUNT, PASSWORD, AND SECURITY
C:\Users\Administrator\Desktop\SEC505-Scripts\Day6-Servers\Kerberos\License.txt:56:MEMBER ACCOUNT, PASSWORD, AND SECURITY
C:\Users\Administrator\Desktop\SEC505-Scripts\Day6-Servers\Kerberos\License.txt:57:If any of the Services requires you to open an account,
you must complete the registration process by providing us with current, complete and accurate information as prompted by the applicable
registration form. You are entirely responsible for maintaining the confidentiality of your password and account. Furthermore, you are
entirely responsible for any and all activities that occur under your account. You agree to notify Microsoft immediately of any unauthorized
use of your account or any other breach of security. Microsoft will not be liable for any loss that you may incur as a result of someone
else using your password or account, either with or without your knowledge. However, you could be held liable for losses incurred by
Microsoft or another party due to someone else using your account or password. You may not use anyone else's account without the permission
of the account holder.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day6-Servers\Kerberos\License.txt:61:As a condition of your use of Services, you will not use
them for any purpose that is unlawful or prohibited by these terms, conditions, and notices. You may not use the Services in any manner that
could damage, disable, overburden, or impair any Microsoft server, or the network(s) connected to any Microsoft server, or interfere with
any other party’s use and enjoyment of any Services. You may not attempt to gain unauthorized access to any Services, other accounts,
computer systems or networks connected to any Microsoft server or to any of the Services, through hacking, password mining or any other
means. You may not obtain or attempt to obtain any materials or information through any means not intentionally made available through the
Services.
C:\Users\Administrator\Desktop\SEC505-Scripts\Day6-Servers\Kerberos\README.txt:1:This folder contains a PowerShell script to reset the
password of
C:\Users\Administrator\Desktop\SEC505-Scripts\Extras\VBScript\passwords.txt:1:password
C:\Users\Administrator\Desktop\SEC505-Scripts\Extras\VBScript\signatures.txt:17:iisadmpwd attempts to access the IIS 4.0
change password scripts (reconnaissance).
C:\Users\Administrator\Desktop\SEC505-Scripts\Extras\VBScript\signatures.txt:47:/\~.+|\%2f\%7e attempts to use a /~ in a
request (possible username search).
C:\Users\Administrator\Desktop\SysinternalsSuite\Eula.txt:28:Please be aware that, similar to other debug tools that capture “process state”
information, files saved by Sysinternals tools may include personally identifiable or other sensitive information (such as usernames,
passwords, paths to files accessed, and paths to registry accessed). By using this software, you acknowledge that you are aware of this and
take sole responsibility for any personally identifiable or other sensitive information provided to Microsoft or any other party through
your use of the software.
C:\Users\Administrator\Desktop\SysinternalsSuite\readme.txt:18:Autologon - Bypass password screen during logon.
C:\Users\Administrator\Desktop\SysinternalsSuite\readme.txt:102:PsPasswd - Changes account passwords.
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Automatic_Variables.help.txt:109: typically C:\Users\<UserName>.
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Functions_Advanced_Parameters.help.txt:181: parameter set, a UserName
parameter in the User parameter set, and a
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Functions_Advanced_Parameters.help.txt:194: $UserName,
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Functions_Advanced_Parameters.help.txt:220: $UserName,
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Functions_Advanced_Parameters.help.txt:561: $UserName
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Functions_OutputTypeAttribute.help.txt:133: $UserName
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Jobs.help.txt:287: The following command starts a job without the required
credentials. It
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Jobs.help.txt:305: credentials to run the command. The value of the Reason
property is:
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Language_Modes.help.txt:172: PSCredential
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Pipelines.help.txt:367: Parameter [Credential] PIPELINE INPUT
ValueFromPipelineByPropertyName NO COERCION
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Preference_Variables.help.txt:1084: ProxyCredential :
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_PSSession_Details.help.txt:106: the current user must be able to supply the
credentials of a member of
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_PSSession_Details.help.txt:142: only if you can supply the credentials of the user
who created the
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_PSSession_Details.help.txt:144: includes RunAs credentials. Otherwise, you can
get, connect to, use,
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Disconnected_Sessions.help.txt:94: but only if they can supply the
credentials that were used
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Disconnected_Sessions.help.txt:95: to create the session, or use the RunAs
credentials of
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_FAQ.help.txt:63: name and password credentials on the local computer or the
credentials
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_FAQ.help.txt:65: The credentials and the rest of the transmission are
encrypted.
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_FAQ.help.txt:513: to use the Credential parameter of the Invoke-Command,
New-PSSession,
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_FAQ.help.txt:514: or Enter-PSSession cmdlets to provide the credentials of
a member of the
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_FAQ.help.txt:521: credentials.
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Requirements.help.txt:62: provide the credentials of an administrator.
Otherwise, the command fails.
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:273: HOW TO PROVIDE ADMINISTRATOR CREDENTIALS
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:279: computer. Credentials are sometimes required
even when the current user is
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:283: computer, or can provide the credentials of a
member of the Administrators
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:284: group, use the Credential parameter of the
New-PSSession, Enter-PSSession
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:287: For example, the following command provides
the credentials of an
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:290: Invoke-Command -ComputerName Server01
-Credential Domain01\Admin01
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:292: For more information about the Credential
parameter, see New-PSSession,
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:374: 2. Use the Credential parameter in all remote
commands.
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:376: This is required even when you are
submitting the credentials
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:400: 2. Verify that a password is set on the
workgroup-based computer. If a
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:401: password is not set or the password value
is empty, you cannot run
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:404: To set password for your user account, use
User Accounts in Control
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:408: 3. Use the Credential parameter in all remote
commands.
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:410: This is required even when you are
submitting the credentials
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:544: -- ProxyCredential
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:548: 1. Use the ProxyAccessType,
ProxyAuthentication, and ProxyCredential
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:562: -ProxyAuthentication Negotiate
-ProxyCredential Domain01\User01
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Return.help.txt:44: function ScreenPassword($instance)
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Return.help.txt:50: foreach ($a in @(get-wmiobject win32_desktop)) {
ScreenPassword($a) }
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Return.help.txt:53: This script checks each user account. The ScreenPassword
function returns
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Return.help.txt:54: the name of any user account that does not have a
password-protected
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Return.help.txt:55: screen saver. If the screen saver is password protected, the
function
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Scopes.help.txt:529: $Cred = Get-Credential
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Scopes.help.txt:530: Invoke-Command $s {Remove-Item .\Test*.ps1 -Credential
$Using:Cred}
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Scopes.help.txt:537: $Cred = Get-Credential
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Scopes.help.txt:538: Invoke-Command $s {param($c) Remove-Item .\Test*.ps1
-Credential $c} -ArgumentList $Cred
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Script_Internationalization.help.txt:157:if (!($username)) { $msgTable.promptMsg }
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Session_Configurations.help.txt:304: the WithProfile session configuration or
can supply the credentials of a
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Session_Configuration_Files.help.txt:230: RunAsPassword
NoteProperty System.String RunAsPassword=
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:173: The MakeCert.exe tool will prompt you for a private key
password. The
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:174: password ensures that no one can use or access the
certificate without
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:175: your consent. Create and enter a password that you can
remember. You will
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:176: use this password later to retrieve the certificate.
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:277: 6. Type a password, and then type it again to confirm.
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:293: 4. On the Password page, select "Enable strong private
key protection",
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:294: and then enter the password that you assigned during
the export
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Updatable_Help.help.txt:156: The Update-Help and Save-Help cmdlets have a
UseDefaultCredentials
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Updatable_Help.help.txt:157: parameter that provides the explicit credentials of
the current
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Updatable_Help.help.txt:161: The Update-Help and Save-Help cmdlets also have a
Credential
C:\Windows\System32\WindowsPowerShell\v1.0\en-US\about_Updatable_Help.help.txt:164: Credential parameter is valid only when you use the
SourcePath
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory.help.txt:32: Account and Password Policy
Management are supported by cmdlets such as
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory.help.txt:34: Set-ADAccountControl, and
Remove-ADFineGrainedPasswordPolicy.
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_Filter.help.txt:133: Get entries with a
bad password count greater than five:
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_Identity.help.txt:105:
ADFineGrainedPasswordPolicy
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_Identity.help.txt:151: SAM User Name
(sAMUserName)
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:34:
ADFineGrainedPasswordPolicy
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:45:
ADDefaultDomainPasswordPolicy
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:192:
ADFineGrainedPasswordPolicy
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:193: Represents a
fine grained password policy object; that is, an AD
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:194: object of type
msDS-PasswordSettings in AD DS and is derived from
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:197: An
ADFineGrainedPasswordPolicy may contain the following properties in
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:204: the directory
attribute: msDS-PasswordComplexityEnabled
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:215: MaxPasswordAge
- A property of type System.TimeSpan, derived from the
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:216: directory
attribute: msDS-MaximumPasswordAge
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:218: MinPasswordAge
- A property of type System.TimeSpan, derived from the
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:219: directory
attribute: msDS-MinimumPasswordAge
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:221:
MinPasswordLength - A property of type System.Int32, derived from the
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:222: directory
attribute: msDS-MinimumPasswordLength
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:224:
PasswordHistoryCount - A property of type System.Int32, derived from
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:225: the directory
attribute: msDS-PasswordHistoryLength
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:228: directory
attribute: msDS-PasswordSettingsPrecedence
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:232:
msDS-PasswordReversibleEncryptionEnabled
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:433:
AllowReversiblePasswordEncryption - A property of type System.Boolean,
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:436: attribute:
ms-DS-UserEncryptedTextPasswordAllowed
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:441:
CannotChangePassword - A property of type System.Boolean, derived from
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:463:
LastBadPasswordAttempt - A property of type System.DateTime, derived
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:464: from the
directory attribute: badPasswordTime
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:479:
PasswordExpired - A property of type System.Boolean, for AD DS it is
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:482: directory
attribute msDS-UserPasswordExpired
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:484:
PasswordLastSet - A property of type System.DateTime, derived from the
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:487:
PasswordNeverExpires - A property of type System.Boolean, for AD LDS
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:490: directory
attribute: msDS-UserDontExpirePassword
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:492:
PasswordNotRequired - A property of type System.Boolean, for AD DS it
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:495: directory
attribute: ms-DS-UserPasswordNotRequired
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:698:
ADDefaultDomainPasswordPolicy
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:699: Represents the
domain-wide password policy of an Active Directory
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:703: An
ADDefaultDomainPasswordPolicy may contain the following properties
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:721: MaxPasswordAge
- A property of type System.TimeSpan, derived from the
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:724: MinPasswordAge
- A property of type System.TimeSpan, derived from the
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:727:
MinPasswordLength - A property of type System.Int32, derived from the
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ActiveDirectory\en-US\about_ActiveDirectory_ObjectModel.help.txt:730:
PasswordHistoryCount - A property of type System.Int32, derived from
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSScheduledJob\en-US\about_Scheduled_Jobs_Troubleshooting.help.txt:94:
C:\Users\<UserName>\AppData\Local\Microsoft\Windows\PowerShell\ScheduledJob
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSScheduledJob\en-US\about_Scheduled_Jobs_Troubleshooting.help.txt:394: job or the
permissions of the user who is specified by the Credential
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSScheduledJob\en-US\about_Scheduled_Jobs_Troubleshooting.help.txt:425:
C:\Users\<UserName>\AppData\Local\Microsoft\Windows\PowerShell
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_ActivityCommonParameters.help.txt:55: PSCredential
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_ActivityCommonParameters.help.txt:216: user's credentials
when connecting to the target computers.
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_ActivityCommonParameters.help.txt:218: Negotiate, and
NegotiateWithImplicitCredential. The default
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_ActivityCommonParameters.help.txt:227: CAUTION: Credential
Security Service Provider (CredSSP)
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_ActivityCommonParameters.help.txt:228: authentication, in
which the user's credentials are passed
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_ActivityCommonParameters.help.txt:233: If the remote
computer is compromised, the credentials that
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_ActivityCommonParameters.help.txt:273: parameter, the
command must include the PSCredential
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_ActivityCommonParameters.help.txt:336: -PSCredential
<PSCredential>
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_ActivityCommonParameters.help.txt:345: or enter a variable
that contains a PSCredential object,
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_ActivityCommonParameters.help.txt:346: such as one that the
Get-Credential cmdlet returns. If
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_ActivityCommonParameters.help.txt:348: password.
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_WorkflowCommonParameters.help.txt:21: PSComputerName and
PSCredential. The PS-prefixed parameters configure
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_WorkflowCommonParameters.help.txt:93: Specifies the
mechanism that is used to authenticate the user's credentials
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_WorkflowCommonParameters.help.txt:95: Credssp, Digest,
Kerberos, Negotiate, and NegotiateWithImplicitCredential.
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_WorkflowCommonParameters.help.txt:102: CAUTION: Credential
Security Service Provider (CredSSP) authentication, in
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_WorkflowCommonParameters.help.txt:103: which the user's
credentials are passed to a remote computer to be
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_WorkflowCommonParameters.help.txt:107: is compromised, the
credentials that are passed to it can be used to control
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_WorkflowCommonParameters.help.txt:160: command must include
the PSCredential parameter. Also, the computer must be
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_WorkflowCommonParameters.help.txt:209: -PSCredential
<PSCredential>
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_WorkflowCommonParameters.help.txt:215: variable that
contains a PSCredential object, such as one that the
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_WorkflowCommonParameters.help.txt:216: Get-Credential
cmdlet returns. If you enter only a user name, you will be
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_WorkflowCommonParameters.help.txt:217: prompted for a
password.
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_Workflows.help.txt:157: -Credential
Domain01\Admin01
C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSWorkflow\en-US\about_Workflows.help.txt:174: -Credential
Domain01\Admin01
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Automatic_Variables.help.txt:109: typically C:\Users\<UserName>.
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Functions_Advanced_Parameters.help.txt:181: parameter set, a UserName
parameter in the User parameter set, and a
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Functions_Advanced_Parameters.help.txt:194: $UserName,
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Functions_Advanced_Parameters.help.txt:220: $UserName,
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Functions_Advanced_Parameters.help.txt:561: $UserName
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Functions_OutputTypeAttribute.help.txt:133: $UserName
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Jobs.help.txt:287: The following command starts a job without the required
credentials. It
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Jobs.help.txt:305: credentials to run the command. The value of the Reason
property is:
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Language_Modes.help.txt:172: PSCredential
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Pipelines.help.txt:367: Parameter [Credential] PIPELINE INPUT
ValueFromPipelineByPropertyName NO COERCION
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Preference_Variables.help.txt:1084: ProxyCredential :
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_PSSession_Details.help.txt:106: the current user must be able to supply the
credentials of a member of
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_PSSession_Details.help.txt:142: only if you can supply the credentials of the user
who created the
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_PSSession_Details.help.txt:144: includes RunAs credentials. Otherwise, you can
get, connect to, use,
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Disconnected_Sessions.help.txt:94: but only if they can supply the
credentials that were used
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Disconnected_Sessions.help.txt:95: to create the session, or use the RunAs
credentials of
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_FAQ.help.txt:63: name and password credentials on the local computer or the
credentials
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_FAQ.help.txt:65: The credentials and the rest of the transmission are
encrypted.
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_FAQ.help.txt:513: to use the Credential parameter of the Invoke-Command,
New-PSSession,
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_FAQ.help.txt:514: or Enter-PSSession cmdlets to provide the credentials of
a member of the
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_FAQ.help.txt:521: credentials.
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Requirements.help.txt:62: provide the credentials of an administrator.
Otherwise, the command fails.
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:273: HOW TO PROVIDE ADMINISTRATOR CREDENTIALS
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:279: computer. Credentials are sometimes required
even when the current user is
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:283: computer, or can provide the credentials of a
member of the Administrators
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:284: group, use the Credential parameter of the
New-PSSession, Enter-PSSession
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:287: For example, the following command provides
the credentials of an
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:290: Invoke-Command -ComputerName Server01
-Credential Domain01\Admin01
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:292: For more information about the Credential
parameter, see New-PSSession,
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:374: 2. Use the Credential parameter in all remote
commands.
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:376: This is required even when you are
submitting the credentials
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:400: 2. Verify that a password is set on the
workgroup-based computer. If a
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:401: password is not set or the password value
is empty, you cannot run
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:404: To set password for your user account, use
User Accounts in Control
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:408: 3. Use the Credential parameter in all remote
commands.
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:410: This is required even when you are
submitting the credentials
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:544: -- ProxyCredential
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:548: 1. Use the ProxyAccessType,
ProxyAuthentication, and ProxyCredential
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Remote_Troubleshooting.help.txt:562: -ProxyAuthentication Negotiate
-ProxyCredential Domain01\User01
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Return.help.txt:44: function ScreenPassword($instance)
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Return.help.txt:50: foreach ($a in @(get-wmiobject win32_desktop)) {
ScreenPassword($a) }
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Return.help.txt:53: This script checks each user account. The ScreenPassword
function returns
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Return.help.txt:54: the name of any user account that does not have a
password-protected
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Return.help.txt:55: screen saver. If the screen saver is password protected, the
function
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Scopes.help.txt:529: $Cred = Get-Credential
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Scopes.help.txt:530: Invoke-Command $s {Remove-Item .\Test*.ps1 -Credential
$Using:Cred}
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Scopes.help.txt:537: $Cred = Get-Credential
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Scopes.help.txt:538: Invoke-Command $s {param($c) Remove-Item .\Test*.ps1
-Credential $c} -ArgumentList $Cred
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Script_Internationalization.help.txt:157:if (!($username)) { $msgTable.promptMsg }
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Session_Configurations.help.txt:304: the WithProfile session configuration or
can supply the credentials of a
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Session_Configuration_Files.help.txt:230: RunAsPassword
NoteProperty System.String RunAsPassword=
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:173: The MakeCert.exe tool will prompt you for a private key
password. The
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:174: password ensures that no one can use or access the
certificate without
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:175: your consent. Create and enter a password that you can
remember. You will
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:176: use this password later to retrieve the certificate.
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:277: 6. Type a password, and then type it again to confirm.
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:293: 4. On the Password page, select "Enable strong private
key protection",
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Signing.help.txt:294: and then enter the password that you assigned during
the export
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Updatable_Help.help.txt:156: The Update-Help and Save-Help cmdlets have a
UseDefaultCredentials
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Updatable_Help.help.txt:157: parameter that provides the explicit credentials of
the current
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Updatable_Help.help.txt:161: The Update-Help and Save-Help cmdlets also have a
Credential
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_Updatable_Help.help.txt:164: Credential parameter is valid only when you use the
SourcePath
PS C:\Users\Administrator>