PowerShell script to execute common internal penetration testing techniques in an Active Directory environment
Invoke-Pentest -List
Invoke-Pentest -TestID All
Invoke-Pentest -TestID Collection
Invoke-Pentest -TestID T1110 -Password 'Welcome1234'
Invoke-Cleanup
- All - Run All Tests
- Collection - Run Collection Tests (T1081, T1086, T1208)
- T1081 - Searches through domain SYSVOL share for any Group Policy Preferences Passwords and decrypts them
- T1086 - Executes BloodHound using the collection methods of "All" and "Loggedon"
- T1110 - Executes password spraying against all active domain accounts. Default password is "Welcome2020!"
- T1208 - Executes kerbeoasting technique against all available SPNs
- Add more tests
- Clean up ugly code
- Add comments
- Add minor evasion techniques
- Add different execution methods for each test
- Integrate lateral movement based on findings
- Attempt simple hash cracking