https://learn.microsoft.com/en-us/powershell/module/activedirectory/?view=windowsserver2022-ps
Get-Module
Import-Module ActiveDirectory
Get-ADDomain
Filtering for accounts with the ServicePrincipalName property populated. This will get us a listing of accounts that may be susceptible to a Kerberoasting attack.
Get-ADUser -Filter {ServicePrincipalName -ne "$null"} -Properties ServicePrincipalName
Get-ADUser -Filter *
Get-ADUser -Filter "Name -like '*admin*'"
Get-ADUser -Identity [username]
Get-ADUser -Identity [username] -Server test.local -Properties *
Get-ADUser -Identity [username] -Properties *
Get-ADUser -Identity [username] -Properties LastLogonDate,MemberOf,Title,Description,PwdLastSet
Get-ADTrust -Filter *
Get-ADGroup -Filter *
Get-ADGroup -Filter * | Select Name
Get-ADGroupMember -Identity "[group name]"
Get-ADGroupMember -Identity "Remote Management Users"
Get-ADGroupMember -Identity "Domain Admins"
Get-ADComputer -Filter *
Get-ADComputer -Filter * | Select Name, OperatingSystem
Get-ADDefaultDomainPasswordPolicy
Import-Module .\\PowerView.ps1