maq: fix missing option in bloodyad command
parent
67a51de64b
commit
eda5d53d6f
|
@ -399,7 +399,7 @@ Members : {}
|
||||||
|
|
||||||
* Find `ms-DS-MachineAccountQuota`
|
* Find `ms-DS-MachineAccountQuota`
|
||||||
```ps1
|
```ps1
|
||||||
bloodyAD -d lab.local -u username -p 'Password123*' --host 10.10.10.10 get object 'DC=lab,DC=local' ms-DS-MachineAccountQuota
|
bloodyAD -d lab.local -u username -p 'Password123*' --host 10.10.10.10 get object 'DC=lab,DC=local' --attr ms-DS-MachineAccountQuota
|
||||||
```
|
```
|
||||||
* Add a new computer in the Active Directory, by default `MachineAccountQuota = 10`
|
* Add a new computer in the Active Directory, by default `MachineAccountQuota = 10`
|
||||||
```ps1
|
```ps1
|
||||||
|
@ -509,4 +509,4 @@ Using the **UnPAC The Hash** method, you can retrieve the NT Hash for an User vi
|
||||||
* [Web endpoints - The Hacker Recipes](https://www.thehacker.recipes/ad/movement/ad-cs/web-endpoints)
|
* [Web endpoints - The Hacker Recipes](https://www.thehacker.recipes/ad/movement/ad-cs/web-endpoints)
|
||||||
* [ADCS ESC13 Abuse Technique - Jonas Bülow Knudsen - 02/15/2024](https://posts.specterops.io/adcs-esc13-abuse-technique-fda4272fbd53)
|
* [ADCS ESC13 Abuse Technique - Jonas Bülow Knudsen - 02/15/2024](https://posts.specterops.io/adcs-esc13-abuse-technique-fda4272fbd53)
|
||||||
* [From DA to EA with ESC5 - Andy Robbins - May 16, 2023](https://posts.specterops.io/from-da-to-ea-with-esc5-f9f045aa105c)
|
* [From DA to EA with ESC5 - Andy Robbins - May 16, 2023](https://posts.specterops.io/from-da-to-ea-with-esc5-f9f045aa105c)
|
||||||
* [ADCS ESC14 Abuse Technique - Jonas Bülow Knudsen - 02/01/2024](https://posts.specterops.io/adcs-esc14-abuse-technique-333a004dc2b9)
|
* [ADCS ESC14 Abuse Technique - Jonas Bülow Knudsen - 02/01/2024](https://posts.specterops.io/adcs-esc14-abuse-technique-333a004dc2b9)
|
||||||
|
|
Loading…
Reference in New Issue