Skip to content

Commit 5c386d5

Browse files
committed
Modified readme to reflect current changes
1 parent 96ef1e9 commit 5c386d5

File tree

1 file changed

+10
-2
lines changed

1 file changed

+10
-2
lines changed

README.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ Cable is a simple post-exploitation tool used for enumeration and further exploi
44
Cable has a few primary features currently, with high hopes at feature expansion:
55
- The ability to request service tickets from accounts registered with a `servicePrincipalName` and place them in a crackable format as part of a Kerberoasting attack.
66
- The ability to write and remove the value of the `msDs-AllowedToActOnBehalfOfOtherIdentity` attribute on desired objects, as part of a Resource-Based Constrained Delegation (RBCD) attack.
7+
- The ability to read and write Discretionary Access Control List (DACL) Access Control Entries (ACE)s
78
- Enumeration of Active Directory Certificate Services (ADCS) CA's and certificate templates.
89
- Enumeration of domain and forest trusts.
910
- Enumeration of domain controllers in the current domain.
@@ -12,6 +13,7 @@ Cable has a few primary features currently, with high hopes at feature expansion
1213
- The ability to set and remove the value of the `servicePrincipalName` attribute on an object, making it kerberoastable and non-kerberoastable respectfully.
1314
- The ability to set and remove the `DONT_REQ_PREAUTH` flag on an objects `userAccountControl` attribute, making it ASREP-Roastable and non ASREP-Roastable respectfully.
1415
- Enumeration of group membership for users.
16+
- The ability to create and delete computer objects
1517
- Enumeration of user membership for groups.
1618
- The ability to add and remove accounts from groups.
1719

@@ -27,7 +29,6 @@ Cable has a few primary features currently, with high hopes at feature expansion
2729
2830
.NET post-exploitation toolkit for Active Directory reconnaissance and exploitation
2931
30-
3132
Cable.exe [Module]
3233
Modules:
3334
ldap [Options] - Enumerate LDAP
@@ -39,6 +40,7 @@ Modules:
3940
ca - Enumerate any active Active Directory Certifcate Services (ADCS) CA's
4041
templates - Enumerate Active Directory Certificate Services (ADCS) Templates
4142
user [Options] - Preform general operations on user accounts
43+
computer [Options] - Add and remove computer accounts from the domain
4244
group [Options] - Enumerate group membership, add, and remove users from groups
4345
4446
Module Options
@@ -67,7 +69,7 @@ dacl:
6769
--read - Operation to read the objects Access Control Entries (ACE)s
6870
--write <permission> - Write a ACE on the selected object, built in permissions are: GenericAll,GenericWrite,User-Force-Reset-Password,Self-Membership
6971
--guid <guid> - Specify custom GUID for permission or extended right to write on the object, alternative for "--write"
70-
--account <account> - Display access an account has on the target object, or set access to this account on the target object
72+
--account <account> - Display access an account has on the target object, or set access to this account on the target object. Example: CORP\jdoe
7173
7274
user:
7375
--setspn <value> - Write to an objects servicePrincipalName attribute
@@ -78,6 +80,12 @@ user:
7880
--password <password> - Change an accounts password
7981
--getgroups - Operation to enumerate a users current group membership
8082
83+
computer:
84+
--add - Operation to add a computer account object
85+
--remove - Operation to delete a computer account object
86+
--name - Computer name to add or remove
87+
--password - Computer account password
88+
8189
group:
8290
--group <group> - The group used for an operation specified
8391
--add <account> - Add a specified account to the group selected

0 commit comments

Comments
 (0)