Skip to content

Commit

Permalink
feat(feat): monteverde machine \n\n Version: release/0.1.65 \n\n ad_g…
Browse files Browse the repository at this point in the history
…etpass, some refactors. \n\n Modified file(s):\n- COMMANDS.md

- Invoke-PowerShellTcp.ps1
- README.md
- docs/COMMANDS.html
- docs/README.html
- docs/index.html
- docs/index.html.bak
- external/install_external.sh
- lazyown
- modules/credentials.json
- payload.json
- sessions/download_resources.sh\nDeleted file(s):\n- Invoke-PowerShellTcp.ps1\n  LazyOwn on HackTheBox: https://app.hackthebox.com/teams/overview/6429 \n\n  LazyOwn/   https://grisuno.github.io/LazyOwn/ \n\n \n\n Fecha: Sat Oct 19 01:10:29 2024 -0300 \n\n Hora: 1729311029
  • Loading branch information
grisuno committed Oct 19, 2024
1 parent c98ace7 commit 60ae728
Show file tree
Hide file tree
Showing 15 changed files with 2,785 additions and 2,517 deletions.
7 changes: 7 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,13 @@
# Changelog


### Nuevas características

### Otros

* * feat(feat): monteverde machine \n\n Version: release/0.1.65 \n\n ad_getpass, some refactors. \n\n Modified file(s):\n- COMMANDS.md - Invoke-PowerShellTcp.ps1 - README.md - docs/COMMANDS.html - docs/README.html - docs/index.html - docs/index.html.bak - external/install_external.sh - lazyown - modules/credentials.json - payload.json - sessions/download_resources.sh\nDeleted file(s):\n- Invoke-PowerShellTcp.ps1\n LazyOwn on HackTheBox: https://app.hackthebox.com/teams/overview/6429 \n\n LazyOwn/ https://grisuno.github.io/LazyOwn/ \n\n \n\n Fecha: Sat Oct 19 01:10:29 2024 -0300 \n\n Hora: 1729311029


### Pruebas

### Otros
Expand Down
17 changes: 17 additions & 0 deletions COMMANDS.md
Original file line number Diff line number Diff line change
Expand Up @@ -6184,6 +6184,23 @@ Note:
- The method assumes that the session name is defined and accessible in
the scope where this method is called.

## adgetpass
Command adgetpass: Generates a PowerShell script to extract credentials from Azure AD Connect Sync.

This function generates a PowerShell script based on user inputs, including the SQL server,
database, and custom keyset values. The script retrieves encryption keys, decrypts credentials,
and outputs the domain, username, and password from the AD Sync configuration.

Args:
line (str): Optional argument to specify the server name, database name, and other options
in the following format: "server_name database_name keyset_id instance_id entropy".

Returns:
None

Example:
adgetpass MONTEVERDE ADSync 1 1852B527-DD4F-4ECF-B541-EFCCBFF29E31 194EC2FC-F186-46CF-B44D-071EB61F49CD

## find_tgts
Finds and returns a list of target hosts with port 445 open in the specified subnet.

Expand Down
1 change: 0 additions & 1 deletion Invoke-PowerShellTcp.ps1

This file was deleted.

24 changes: 24 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -7774,6 +7774,23 @@ Note:
- The method assumes that the session name is defined and accessible in
the scope where this method is called.

## adgetpass
Command adgetpass: Generates a PowerShell script to extract credentials from Azure AD Connect Sync.

This function generates a PowerShell script based on user inputs, including the SQL server,
database, and custom keyset values. The script retrieves encryption keys, decrypts credentials,
and outputs the domain, username, and password from the AD Sync configuration.

Args:
line (str): Optional argument to specify the server name, database name, and other options
in the following format: "server_name database_name keyset_id instance_id entropy".

Returns:
None

Example:
adgetpass MONTEVERDE ADSync 1 1852B527-DD4F-4ECF-B541-EFCCBFF29E31 194EC2FC-F186-46CF-B44D-071EB61F49CD

## find_tgts
Finds and returns a list of target hosts with port 445 open in the specified subnet.

Expand Down Expand Up @@ -7993,6 +8010,13 @@ Helper function to alternate the case of characters in a string.
# Changelog


### Pruebas

### Otros

* * test(test): test \n\n Version: release/0.1.64 \n\n test \n\n Modified file(s):\n- README.md - docs/README.html - docs/index.html - docs/index.html.bak - lazyown - sessions/users.txt\n LazyOwn on HackTheBox: https://app.hackthebox.com/teams/overview/6429 \n\n LazyOwn/ https://grisuno.github.io/LazyOwn/ \n\n \n\n Fecha: Sat Oct 19 00:18:05 2024 -0300 \n\n Hora: 1729307885


### Pruebas

### Otros
Expand Down
Loading

0 comments on commit 60ae728

Please sign in to comment.