Machine:
powershell -ep bypass-ep execution policy
IF IT HANGS:
just doesn’t work
Try it using meterpreter:
load powershellhow do I use 😭 I gotchu bro:
https://www.sans.org/blog/offensive-powershell-metasploit-meterpreter/
to run this command thru meterpreter after loading powershell:
Get-ADGroupMember -identity Helpdeskdo meterpreter>
powershell_execute 'Get-ADGroupMember -identity Helpdesk'Use metasploit’s suggester from meterpreter:
run post/multi/recon/local_exploit_suggester