Directory Services Internals PowerShell Module and Framework
Go to file
Michael Grafnetter c1286aa1f2 Updated links and icons in Readme 2019-05-10 23:39:18 +02:00
.github Updated links and icons in Readme 2019-05-10 23:39:18 +02:00
Documentation Finalize Chocolatey package 2019-05-10 23:12:10 +02:00
Keys Initial source commit 2015-12-26 23:44:43 +01:00
Scripts Finalize Chocolatey package 2019-05-10 23:12:10 +02:00
Src Finalize Chocolatey package 2019-05-10 23:12:10 +02:00
.gitattributes Header files are now counted as CPP instead of C 2019-02-01 20:53:52 +01:00
.gitignore Removed MIDL generated code from repo 2018-12-31 12:11:40 +01:00
LICENSE.md Added acknowledgements and updated the license. 2019-01-11 22:34:13 +01:00
azure-pipelines.yml Update azure-pipelines.yml for Azure Pipelines 2019-05-09 15:14:18 +02:00

.github/README.md

DSInternals PowerShell Module and Framework

MIT License PowerShell 3 | 4 | 5 Windows Server 2008 R2 | 2012 R2 | 2016 | 2019 .NET Framework 4.5.1+

Introduction

The DSInternals project consists of these two parts:

DISCLAIMER: Features exposed through these tools are not supported by Microsoft. Improper use might cause irreversible damage to domain controllers or negatively impact domain security.

Author

Michael Grafnetter

Twitter Blog LinkedIn

I have created these tools in my spare time and I am using them while performing AD security audits and also in my lectures to demonstrate how Active Directory works internally.

I would like to thank all people who have contributed to the project by sending their feedback or by submitting their code. In case you would also like to help with this project, please see the CONTRIBUTING document.

Several people who use DSInternals during AD security audits have asked to donate. I have therefore set up a PayPal account:

Donate

Downloads

PowerShell Gallery Downloads Chocolatey Downloads GitHub Downloads NuGet Gallery Downloads

Since PowerShell 5, you can install the DSInternals module directly from the official PowerShell Gallery by running the following command:

Install-Module DSInternals -Force

Chocolatey Package

You can install the official Chocolatey package using the following Chocolatey command:

choco install dsinternals-psmodule 

This package is self-contained and it will also install all dependencies.

Offline Module Distribution (PowerShell 3+)

  1. Download the current release from GitHub.
  2. Unblock the ZIP file, using either the Properties dialog or the Unblock-File cmdlet. If you fail to do so, all the extracted DLLs will inherit this attribute and PowerShell will refuse to load them.
  3. Extract the DSInternals directory to your PowerShell modules directory, e.g. C:\Windows\system32\WindowsPowerShell\v1.0\Modules\DSInternals or C:\Users\John\Documents\WindowsPowerShell\Modules\DSInternals.
  4. (Optional) If you copied the module to a different directory than advised in the previous step, you have to manually import it using the Import-Module cmdlet.

Commando VM

The DSInternals PowerShell module is part of FireEye's Commando VM, the Windows-based alternative to Kali Linux.

NuGet Packages

The easiest way of integrating the DSInternals functionality into .NET applications is by using the DSInternals Framework NuGet packages.

Building from Source Code

Visual Studio 2015 | 2017 | 2019 Build Status Test Results

You can of course download the source code, perform a review and compile the Module/Framework yourself. See the CONTRIBUTING guide for more info.

Documentation

Get-Help

The online version of PowerShell Get-Help documentation contains the list of all cmdlets and some usage examples.

Blog Posts

I have also published a series of articles about the DSInternals module on my blog. Here are a few of them:

Slide Decks

Acknowledgements

This project utilizes the following 3rd party copyrighted material:

  • ManagedEsent - Provides managed access to esent.dll, the embeddable database engine native to Windows.
  • AutoMapper - A convention-based object-object mapper in .NET.
  • NDceRpc - Integration of WCF and .NET with MS-RPC and binary serialization.
  • PBKDF2.NET - Provides PBKDF2 for .NET Framework.
  • Mimikatz - The No.1 tool for pass-the-hash attacks. Can use the credentials extracted by the DSInternals module to do some nasty stuff.
  • NTDSXtract - A framework for ntds.dit parsing written in Python.
  • Impacket - Various MSRPC-based protocols implemented in Python.
  • DIT Snapshot Viewer - A graphical inspection tool for Active Directory databases.
  • Esent Workbench - Great tool for displaying the structure of ntds.dit files.