In this informative tutorial, we dive into the essentials of using PowerView to enumerate trusts effortlessly.

Whether you’re a cybersecurity professional, a penetration tester, or simply curious about Active Directory enumeration, this tutorial will guide you through a simple yet effective trick to uncover domain trusts with ease.

We’ll cover the fundamental concepts of PowerView, demonstrate the enumeration process step-by-step, and share tips on how to optimize your results.

By the end of this tutorial, you’ll be equipped with practical knowledge that will enhance your skills in domain enumeration.

Get a list of all domain trusts for the current domain

Get-NetDomainTrust
Get-NetDomainTrust -Domain us.dollarcorp.moneycorp.local

Get details about the current forest

Get-NetForest
Get-NetForest -Forest eurocorp.local

Get all domains in the current forest

Get-NetForestDomain
Get-NetForestDomain -Forest eurocorp.local

Get all global catalogs for the current forest

Get-NetForestCatalog
Get-NetForestCatalog -Forest eurocorp.local

Map trusts of a forest

Get-NetForestTrust
Get-NetForestTrust -Forest eurocorp.local

PowerView Enumeration [ User Hunting ]

Find all machines on the current domain where the current user has local admin access

Find-LocalAdminAccess -Verbose

Find computers where a domain admin (or specified user/group) has sessions

Invoke-UserHunter
Invoke-UserHunter -GroupName "RDPUsers"

To confirm admin access

Invoke-UserHunter -CheckAccess

Find computers where a domain admin is logged-in

Invoke-UserHunter -Stealth

Find computers where a domain admin (or specified user/group) has sessions

Find-DomainUserLocation -Verbose
Find-DomainUserLocation -UserGroupIdentity "StudentUsers"

Find computers where a domain admin session is available and current user has admin access (uses Test-AdminAccess)

Find-DomainUserLocation -CheckAccess

Find computers (File Servers and Distributed File servers) where a domain admin session is available.

Find-DomainUserLocation –Stealth