You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It is highly recommended to go through the documentation listed below to get the most out of PsMapExec. If you do not feel like reading the documentation then simply go to the Usage section further down this document.
Target acquisition through PsMapExec is utilized through ADSI Searcher. As long as you are operating from a domain joined system as a domain user account, no issues should be encountered when acquiring targets.
118
-
By default only enabled Active Directory computer accounts are populated into the target list. PsMapExec will set the Domain to the current user domain unless -Domain is specified.
119
-
IP address targeting is less preffered than using the built in ldap queries.
120
-
```bash
121
-
# All workstations, servers and domain controllers within the domain
122
-
PsMapExec -Targets All
123
-
124
-
# All workstations, servers and domain controllers on the specified domain
125
-
PsMapExec -Targets All -Domain [Domain]
126
-
127
-
# Only servers from the domain (exluding DCs)
128
-
PsMapExec -Targets Servers
129
-
130
-
# Only Domain Controllers from the domain
131
-
PsMapExec -Targets DCs
132
-
133
-
# Only workstations from the domain
134
-
PsMapExec -Targets Workstations
135
-
136
-
# Set the target values to a defined computer name
137
-
PsMapExec -Targets DC01.Security.local
138
-
139
-
# Read targets from file
140
-
PsMapExec -Targets "C:\Targets.txt"
141
-
142
-
# Wildcard filtering
143
-
PsMapExec -Targets SRV*
144
-
145
-
# Single IP Address
146
-
PsMapExec -Targets 192.168.56.11
147
-
148
-
# CIDR Range
149
-
PsMapExec -Targets 192.168.56.0/24
150
-
```
151
-
### Authentication Types
152
-
When -Command and -Module are omitted, PsMapExec will simply check the provided or current user credentials against the specified target systems for administrative access over the specified method.
153
-
```powershell
154
-
# Current user
155
-
PsMapExec -Targets All -Method [Method]
156
-
157
-
# With Password
158
-
PsMapExec -Targets All -Method [Method] -Username [Username] -Password [Password]
159
-
160
-
# With Hash
161
-
PsMapExec -Targets All -Method [Method] -Username [Username] -Hash [RC4/AES256/NTLM]
162
-
163
-
# With Ticket
164
-
PsMapExec -Targets All -Method [Method] -Ticket [doI.. OR Path to ticket file]
165
-
166
-
# Local Authentication (WMI only)
167
-
PsMapExec -Targets All -Method WMI -LocalAuth
168
-
```
169
-
### Command Execution
170
-
All currently supported command execution methods support the -Command parameter. The command parameter can be appended to the above Authentication Types to execute given commands as a specified or the current user.
171
-
```powershell
172
-
PsMapExec -Targets All -Method [Method] -Command [Command]
173
-
```
174
-
175
-
### Module Execution
176
-
All currently supported command execution methods support the -Module parameter. The module parameter can be appended to the Authentication Types to execute given modules as a specified or the current user.
177
-
```powershell
178
-
PsMapExec -Targets All -Method [Method] -Module [Module]
179
-
```
180
-
A list of modules is linked below in the Detailed Usage section.
18
+
It is highly recommended to go through the documentation detailed in the Wiki for usage guidance.
0 commit comments