You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+10-2Lines changed: 10 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,7 @@ Cable is a simple post-exploitation tool used for enumeration and further exploi
4
4
Cable has a few primary features currently, with high hopes at feature expansion:
5
5
- The ability to request service tickets from accounts registered with a `servicePrincipalName` and place them in a crackable format as part of a Kerberoasting attack.
6
6
- The ability to write and remove the value of the `msDs-AllowedToActOnBehalfOfOtherIdentity` attribute on desired objects, as part of a Resource-Based Constrained Delegation (RBCD) attack.
7
+
- The ability to read and write Discretionary Access Control List (DACL) Access Control Entries (ACE)s
7
8
- Enumeration of Active Directory Certificate Services (ADCS) CA's and certificate templates.
8
9
- Enumeration of domain and forest trusts.
9
10
- Enumeration of domain controllers in the current domain.
@@ -12,6 +13,7 @@ Cable has a few primary features currently, with high hopes at feature expansion
12
13
- The ability to set and remove the value of the `servicePrincipalName` attribute on an object, making it kerberoastable and non-kerberoastable respectfully.
13
14
- The ability to set and remove the `DONT_REQ_PREAUTH` flag on an objects `userAccountControl` attribute, making it ASREP-Roastable and non ASREP-Roastable respectfully.
14
15
- Enumeration of group membership for users.
16
+
- The ability to create and delete computer objects
15
17
- Enumeration of user membership for groups.
16
18
- The ability to add and remove accounts from groups.
17
19
@@ -27,7 +29,6 @@ Cable has a few primary features currently, with high hopes at feature expansion
27
29
28
30
.NET post-exploitation toolkit for Active Directory reconnaissance and exploitation
29
31
30
-
31
32
Cable.exe [Module]
32
33
Modules:
33
34
ldap [Options] - Enumerate LDAP
@@ -39,6 +40,7 @@ Modules:
39
40
ca - Enumerate any active Active Directory Certifcate Services (ADCS) CA's
40
41
templates - Enumerate Active Directory Certificate Services (ADCS) Templates
41
42
user [Options] - Preform general operations on user accounts
43
+
computer [Options] - Add and remove computer accounts from the domain
42
44
group [Options] - Enumerate group membership, add, and remove users from groups
43
45
44
46
Module Options
@@ -67,7 +69,7 @@ dacl:
67
69
--read - Operation to read the objects Access Control Entries (ACE)s
68
70
--write <permission> - Write a ACE on the selected object, built in permissions are: GenericAll,GenericWrite,User-Force-Reset-Password,Self-Membership
69
71
--guid <guid> - Specify custom GUID for permission or extended right to write on the object, alternative for "--write"
70
-
--account <account> - Display access an account has on the target object, or set access to this account on the target object
72
+
--account <account> - Display access an account has on the target object, or set access to this account on the target object. Example: CORP\jdoe
71
73
72
74
user:
73
75
--setspn <value> - Write to an objects servicePrincipalName attribute
@@ -78,6 +80,12 @@ user:
78
80
--password <password> - Change an accounts password
79
81
--getgroups - Operation to enumerate a users current group membership
80
82
83
+
computer:
84
+
--add - Operation to add a computer account object
85
+
--remove - Operation to delete a computer account object
86
+
--name - Computer name to add or remove
87
+
--password - Computer account password
88
+
81
89
group:
82
90
--group <group> - The group used for an operation specified
83
91
--add <account> - Add a specified account to the group selected
0 commit comments