Here is a simple powershell script to list the service principal names
among user accounts in a Windows domain. Understanding why the SPNs
exist and how they could be abused is important. $info = Get-ADUser -Filter * -Properties ServicePrincipalNames ForEach ($user in $info) { $samAccountName = $user.SamAccountName If ($user.ServicePrincipalNames -ne $null) { ForEach ($spn in $user.ServicePrincipalNames) { "$($samAccountName) $spn" } } }
Twitter: @lokut
This blog is for educational purposes only. The opinions expressed in this blog are my own and do not reflect the views of my employers.
Monday, May 11, 2020
List of Service Principal Names (SPNs) amongst AD Users
Subscribe to:
Post Comments (Atom)
Test Authentication from Linux Console using python3 pexpect
Working with the IT420 lab, you will discover that we need to discover a vulnerable user account. The following python3 script uses the pex...
-
Here is a quick walk through of GetBoo. The first item that I found was you can harvest the usernames of the existing users that are regist...
-
As I was glancing through the logs of my honeypots I spent some time to look at the following logs. In the past I have just overlooked them...
-
I thought I would work through a few of these web applications provided by OWASP on their broken web applications VM. The first one I th...
-
Today looking at the logs of the honeypots, I became curious based on the whois of the IP Addresses attempting to login to SSH which country...
-
Recently I was doing some scanning with a tool that is available on github called masscan. The tool allows you to configure a configuration...
No comments:
Post a Comment