You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If you want to build the module from source code yourself, you need to install these programs first:
52
-
-[Microsoft Visual Studio Community](https://www.visualstudio.com/en-us/products/visual-studio-community-vs.aspx) 2022 with these features installed:
52
+
-[Microsoft Visual Studio Community](https://visualstudio.microsoft.com/vs/community/) 2022 with these features installed:
53
53
* .NET Framework 4.8 targeting pack
54
54
* C++ 2022 Redistributable Update
55
55
* C++/CLI support for v143 build tools (Latest)
56
56
* MSVC v143 - VS 2022 C++ x64/x86 build tools (Latest)
57
57
* MSVC v143 - VS 2022 C++ ARM64/ARM64EC build tools (Latest)
58
-
* Windows Universal C Runtime
59
-
* Windows 11 SDK (you might have to retarget the [DSInternals.Replication.Interop](../Src/DSInternals.Replication.Interop/DSInternals.Replication.Interop.vcxproj) project to the version you have)
58
+
* Windows 11 SDK (you might have to retarget the `DSInternals.Replication.Interop` projects to the version you have)
To make IntelliSense work with *.psm1 files, the following code needs to be added to the `C:\Program Files\Microsoft Visual Studio\2022\Enterprise\Xml\Schemas\catalog.xml` file:
66
64
@@ -69,20 +67,18 @@ To make IntelliSense work with *.psm1 files, the following code needs to be adde
Copy file name to clipboardExpand all lines: .github/README.md
+11-10Lines changed: 11 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,20 +19,20 @@ The DSInternals project consists of these two parts:
19
19
-[Active Directory password auditing](../Documentation/PowerShell/Test-PasswordQuality.md#test-passwordquality) that discovers accounts sharing the same passwords or having passwords in a public database like [HaveIBeenPwned](https://haveibeenpwned.com) or in a custom dictionary.
20
20
-[Key credential auditing and generation](../Documentation/PowerShell/Get-ADKeyCredential.md#get-adkeycredential), including support for NGC, FIDO2 and STK keys. Keys can also be tested against the [ROCA vulnerability](https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV190026). New NGC keys can also be [registered through the MS-DRSR protocol](../Documentation/PowerShell/Add-ADReplNgcKey.md#add-adreplngckey).
21
21
-[Bare-metal recovery of domain controllers](../Documentation/PowerShell/New-ADDBRestoreFromMediaScript.md#new-addbrestorefrommediascript) from just IFM backups (ntds.dit + SYSVOL).
22
-
- Offline ntds.dit file manipulation, including [hash dumping](../Documentation/PowerShell/Get-ADDBAccount.md#get-addbaccount), [password resets](../Documentation/PowerShell/Set-ADDBAccountPassword.md#set-addbaccountpassword), [group membership changes](../Documentation/PowerShell/Set-ADDBPrimaryGroup.md#set-addbprimarygroup), [SID History injection](../Documentation/PowerShell/Add-ADDBSidHistory.md#add-addbsidhistory)and [enabling](../Documentation/PowerShell/Enable-ADDBAccount.md#enable-addbaccount)/[disabling](../Documentation/PowerShell/Disable-ADDBAccount.md#disable-addbaccount) accounts.
22
+
- Offline ntds.dit file manipulation, including [hash dumping](../Documentation/PowerShell/Get-ADDBAccount.md#get-addbaccount), [password resets](../Documentation/PowerShell/Set-ADDBAccountPassword.md#set-addbaccountpassword), [group membership changes](../Documentation/PowerShell/Set-ADDBPrimaryGroup.md#set-addbprimarygroup), [trust password extraction](../Documentation/PowerShell/Get-ADDBTrust.md#get-addbtrust), [Golden gMSA and dMSA attacks](../Documentation/PowerShell/Get-ADDBServiceAccount.md#get-addbserviceaccount), [enabling](../Documentation/PowerShell/Enable-ADDBAccount.md#enable-addbaccount)/[disabling](../Documentation/PowerShell/Disable-ADDBAccount.md#disable-addbaccount) accounts, [LAPS password decryption](../Documentation/PowerShell/Get-ADDBAccount.md#example-9), and [DNS zone data export](../Documentation/PowerShell/Get-ADDBDnsResourceRecord.md#get-addbdnsresourcerecord).
23
23
-[Online password hash dumping](../Documentation/PowerShell/Get-ADReplAccount.md#get-adreplaccount) through the Directory Replication Service (DRS) Remote Protocol (MS-DRSR). This feature is commonly called DCSync.
24
24
-[Domain or local account password hash injection](../Documentation/PowerShell/Set-SamAccountPasswordHash.md#set-samaccountpasswordhash) through the Security Account Manager (SAM) Remote Protocol (MS-SAMR) or [directly into the database](../Documentation/PowerShell/Set-ADDBAccountPasswordHash.md#set-addbaccountpasswordhash).
25
25
-[LSA Policy modification](../Documentation/PowerShell/Set-LsaPolicyInformation.md#set-lsapolicyinformation) through the Local Security Authority (Domain Policy) Remote Protocol (MS-LSAD / LSARPC).
26
-
-[Extracting credential roaming data](../Documentation/PowerShell/Save-DPAPIBlob.md#save-dpapiblob) and DPAPI domain backup keys, either online through [directory replication](../Documentation/PowerShell/Get-ADReplBackupKey.md#get-adreplbackupkey), [LSARPC](../Documentation/PowerShell/Get-LsaBackupKey.md#get-lsabackupkey) and [offline from ntds.dit](../Documentation/PowerShell/Get-ADDBBackupKey.md#get-addbbackupkey).
27
-
- Password hash calculation, including [NT hash](../Documentation/PowerShell/ConvertTo-NTHash.md#convertto-nthash), [LM hash](../Documentation/PowerShell/ConvertTo-LMHash.md#convertto-lmhash) and [kerberos keys](../Documentation/PowerShell/ConvertTo-KerberosKey.md#convertto-kerberoskey).
26
+
-[Extracting credential roaming data](../Documentation/PowerShell/Save-DPAPIBlob.md#save-dpapiblob) and DPAPI domain backup keys, either online through [directory replication](../Documentation/PowerShell/Get-ADReplBackupKey.md#get-adreplbackupkey), [LSARPC](../Documentation/PowerShell/Get-LsaBackupKey.md#get-lsabackupkey), and [offline from ntds.dit](../Documentation/PowerShell/Get-ADDBBackupKey.md#get-addbbackupkey).
27
+
- Password hash calculation, including [NT hash](../Documentation/PowerShell/ConvertTo-NTHash.md#convertto-nthash), [LM hash](../Documentation/PowerShell/ConvertTo-LMHash.md#convertto-lmhash), and [kerberos keys](../Documentation/PowerShell/ConvertTo-KerberosKey.md#convertto-kerberoskey).
28
28
29
29
> DISCLAIMER: Features exposed through these tools are not supported by Microsoft. Improper use might cause irreversible damage to domain controllers or negatively impact domain security.
Since PowerShell 5, you can install the DSInternals module directly from the official [PowerShell Gallery](https://www.powershellgallery.com/packages/DSInternals/) by running the following command:
52
+
You can install the DSInternals module directly from the official [PowerShell Gallery](https://www.powershellgallery.com/packages/DSInternals/) by running the following command:
53
53
54
54
```powershell
55
55
Install-Module DSInternals -Force
@@ -86,7 +86,7 @@ This package is self-contained and it will also install all dependencies. Note t
86
86
87
87
### WAPT Package
88
88
89
-
The DSInternals PowerShell Module can also be installed using the [WAPT package](https://wapt.tranquil.it/store/tis-dsinternals/).
89
+
The DSInternals PowerShell Module can also be installed using the [WAPT package](https://wapt.tranquil.it/store/en/tis-dsinternals).
90
90
91
91
The package can be installed by the [WAPT console](https://www.wapt.fr/en/doc/wapt-console-usage.html) or by the [WAPT Command-line interface](https://www.wapt.fr/en/doc/wapt-command-line-interface.html) like so:
92
92
@@ -96,7 +96,7 @@ wapt-get install dsinternals
96
96
97
97
This package is self-contained and it will also install all dependencies.
98
98
99
-
### Offline Module Distribution (PowerShell 3+)
99
+
### Offline Module Distribution
100
100
101
101
1. Download the [current release](https://github.com/MichaelGrafnetter/DSInternals/releases) from GitHub.
102
102
2.*Unblock* the ZIP file, using either the *Properties dialog* or the `Unblock-File` cmdlet. If you fail to do so, all the extracted DLLs will inherit this attribute and PowerShell will refuse to load them.
@@ -118,8 +118,8 @@ The easiest way of integrating the DSInternals functionality into .NET applicati
118
118
119
119
### Building from Source Code
120
120
121
-
[](CONTRIBUTING.md#building-from-source-code)
You can of course download the [source code](https://github.com/MichaelGrafnetter/DSInternals/archive/master.zip), perform a review and compile the Module/Framework yourself. See the [CONTRIBUTING](CONTRIBUTING.md#building-from-source-code) guide for more info.
125
125
@@ -147,6 +147,7 @@ I have also published a series of articles about the DSInternals module on [my b
147
147
-[Impersonating Office 365 Users With Mimikatz](https://www.dsinternals.com/en/impersonating-office-365-users-mimikatz/)
148
148
149
149
### Slide Decks
150
+
150
151
-[Black Hat Europe 2019: DSInternals PowerShell Module](https://www.dsinternals.com/wp-content/uploads/eu-19-Grafnetter-DSInternals-PowerShell-Module.pdf)
151
152
-[Black Hat Europe 2019: Exploiting Windows Hello for Business](https://www.dsinternals.com/wp-content/uploads/eu-19-Grafnetter-Exploiting-Windows-Hello-for-Business.pdf)
152
153
-[HipConf New York 2018: Offline Attacks on Active Directory](https://www.dsinternals.com/wp-content/uploads/HIP_AD_Offline_Attacks.pdf)
Copy file name to clipboardExpand all lines: Documentation/CHANGELOG.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,10 +5,13 @@
5
5
6
6
All notable changes to this project will be documented in this file. The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).
7
7
8
-
## [Unreleased]
8
+
## [6.0] - 2025-08-14
9
9
10
10
### Added
11
11
12
+
- PowerShell Core 7 and .NET SDK are now supported on the Windows platform.
13
+
- The PowerShell module, NuGet packages, binaries, and scripts are digitally signed.
14
+
- All pure CLR assemblies are built deterministically.
12
15
- The new [Get-ADDBTrust](PowerShell/Get-ADDBTrust.md#get-addbtrust) cmdlet can read inter-domain trust objects from `ntds.dit` files, decrypt the trust passwords, and derive the Kerberos trust keys.
13
16
- Added the [Get-ADReplKdsRootKey](PowerShell/Get-ADReplKdsRootKey.md#get-adreplkdsrootkey) cmdlet to enable reading specific KDS Root Keys over the MS-DRSR protocol.
14
17
- Full support for `ntds.dit` files originating from RODCs.
@@ -625,7 +628,8 @@ This is a [Chocolatey](https://chocolatey.org/packages/dsinternals-psmodule)-onl
Copy file name to clipboardExpand all lines: Src/DSInternals.Common/DSInternals.Common.csproj
+3-2Lines changed: 3 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -2,11 +2,12 @@
2
2
<!-- NuGet package metadata -->
3
3
<PropertyGroup>
4
4
<IsPackable>true</IsPackable>
5
-
<Version>5.5</Version>
5
+
<Version>6.0</Version>
6
6
<AssemblyTitle>DSInternals Common Library</AssemblyTitle>
7
7
<Title>$(AssemblyTitle)</Title>
8
8
<Description>This package is shared between all other DSInternals packages. Its main features are Azure AD Graph API and ADSI clients for for retrieval of cryptographic material. It contains implementations of common hash functions used by Windows, including NT hash, LM hash and OrgId hash. It also contains methods for SysKey/BootKey retrieval.</Description>
9
-
<PackageReleaseNotes>- Added support for AD trusts.</PackageReleaseNotes>
9
+
<PackageReleaseNotes>- Migrated to .NET SDK.
10
+
- Added support for AD trusts.</PackageReleaseNotes>
10
11
<PackageTags>ActiveDirectory Security Entra AD AAD Identity Active Directory</PackageTags>
<Description>DSInternals DataStore is an advanced framework for offline ntds.dit file manipulation. It can be used to extract password hashes from Active Directory backups or to modify the sIDHistory and primaryGroupId attributes.</Description>
9
-
<PackageReleaseNotes>- Added support for AD trusts.
10
-
- Switched to using custom NuGet packages.</PackageReleaseNotes>
9
+
<PackageReleaseNotes>- Migrated to .NET SDK.
10
+
- Added support for AD trusts.
11
+
- Switched to using custom ManagedEsent NuGet packages.</PackageReleaseNotes>
11
12
<PackageTags>ActiveDirectory Security NTDS AD Identity Active Directory</PackageTags>
@@ -37,6 +37,7 @@ The DSInternals PowerShell Module has these main features:
37
37
## Disclaimer
38
38
Features exposed through these tools are not supported by Microsoft. Improper use might cause irreversible damage to domain controllers or negatively impact domain security.</description>
39
39
<releaseNotes>
40
+
* Implemented support for PowerShell Core 7 on Windows.
40
41
* The new Get-ADDBTrust cmdlet can read inter-domain trust objects from ntds.dit files, decrypt the trust passwords, and derive the Kerberos trust keys.
41
42
* Added the Get-ADReplKdsRootKey cmdlet to enable reading specific KDS Root Keys over the MS-DRSR protocol.
42
43
* Implemented full support for ntds.dit files originating from RODCs.
Copy file name to clipboardExpand all lines: Src/DSInternals.PowerShell/DSInternals.psd1
+1Lines changed: 1 addition & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -228,6 +228,7 @@ PrivateData = @{
228
228
229
229
# ReleaseNotes of this module
230
230
ReleaseNotes=@"
231
+
- Implemented support for PowerShell Core 7 on Windows.
231
232
- The new Get-ADDBTrust cmdlet can read inter-domain trust objects from ntds.dit files, decrypt the trust passwords, and derive the Kerberos trust keys.
232
233
- Added the Get-ADReplKdsRootKey cmdlet to enable reading specific KDS Root Keys over the MS-DRSR protocol.
233
234
- Implemented full support for ntds.dit files originating from RODCs.
0 commit comments