OneLogicalMyth / Invoke-GPPCSE

Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Invoke-GPPCSE

Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords.

You can read about how it works here: https://glanfield.co.uk/make-group-policy-preferences-guid-again/

Running

First import the module.

Import-Module .\GPPCSE.psd1

To make it easier the module is also in a single file.

Import-Module .\Invoke-GPPCSE_Merged.ps1

Running against the local domain.

Invoke-GPPCSE

Running against a trusted domain. This will use your current credentials to authenticate against the remote domain.

Invoke-GPPCSE -DomainController 192.168.1.1

Running against a remote domain.

Invoke-GPPCSE -DomainController 192.168.1.1 -Username LowPriv -Password Password1

You can create a HTML report of the results by doing the following:

$Results = Invoke-GPPCSE
New-GPPCSEReport -Data $Results | Out-File Report.html

ToDo

  • Create a C# version
  • Add support for autologon registry keys

About

Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords

License:GNU General Public License v3.0


Languages

Language:PowerShell 100.0%