ShellSpells
  • 🧙‍♂️Welcome!
    • ShellSpells
    • FAQs
    • License & Disclaimer
  • 🐧Linux
    • System Ops
      • Transcripts
      • Help
      • System Info
        • Date/Time
        • System Details
        • Patches & Updates
        • Init System Identification
        • Hostname / Host ID
        • Variables
        • Hardware & Resources
      • Filesystem
        • Traverse & Enumerate
        • Drives & Partitions
        • Shares
        • Packages
        • Connected Devices
        • Kernel Modules (Drivers)
      • Users & Groups
        • Enumerate
        • Modify
      • Network
        • Enumerate
        • Modify
      • Scheduled Jobs
        • Enumerate
        • Modify
      • Processes
        • Enumerate
        • Modify
        • Custom Script and Shared Object
        • Process I/O Redirection
      • Services
        • Enumerate
        • Modify
        • Create a Service
      • Startup/Boot Scripts
        • Enumerate
        • Modify
      • Security
        • Antivirus
        • Firewall
        • SSH Keys
      • History & Logs
        • History
        • Logs
    • File Ops
      • Search
        • Filename
        • Content
        • Users (Owners)
        • Time
        • Size
        • Permission
        • Hidden Files
        • Inode
        • Find + Exec
        • Notes
      • Enumerate Metadata
      • Modify Metadata
      • Read Content
      • Modify Content
      • Extract Content
      • Sort / Compare / Count
      • Move
      • Copy
      • Execute
      • Hash
      • Encode/Decode
      • Compress/Decompress
      • Working With Weird Filenames
    • Terminal Ops
      • Keyboard Shortcuts
      • Tmux Shortcuts
  • 🪟Windows
    • System Ops
      • Transcripts
      • Help
      • System Info
        • One-liners
        • Date/Time
        • System Details
        • Hotfixes
        • Domain or Workgroup
        • Data Execution Prevention
        • Variables
        • Hardware & Resources
      • Filesystem
        • Traverse & Enumerate
        • Drives & Partitions
        • Installed Software
        • Drivers
        • Shares
      • Registry
        • Enumerate
        • Modify
        • Forensically Relevant Keys
      • Users & Groups
        • Enumerate
        • Modify
      • Network
        • Enumerate
        • Modify
      • Scheduled Tasks
      • Processes
        • Enumerate
        • Modify
      • Services
        • Enumerate
        • Modify
      • Autorun / Startup
        • Enumerate
        • Modify
      • Security
        • Permissions
          • Enumerate
          • Page
        • Antivirus
        • Firewall
          • Enumerate
          • Modify
        • Audit Policies
        • Remoting
          • Enumerate
          • Modify
          • Registry Locations
        • Stored Credentials
      • Remote Command Execution
      • Active Directory
        • Enumerate
        • Modify
      • History & Logs
        • History
        • Logs
      • PowerShell Config
      • Scripting
      • WMIC Notes
    • File Ops
      • Search
        • Filename
        • Time
        • Size
        • Permissions
        • Attributes
        • Wildcarding
      • Enumerate Metadata
        • One Liners
        • Users (Owners)
        • Timestamps
        • Size
        • Permissions
        • Attributes
      • Modify Metadata
        • Change Owner
        • Timestamps
        • Size
        • Attributes
      • Read Content
      • Modify Content
        • Overwrite
        • Insert
        • Append
        • Replace / Remove
        • Convert Case
        • Alternate Data Streams
      • Extract Content
      • Sort / Compare / Count
        • Sort
        • Count
        • Compare
      • Move
      • Copy
      • Execute
      • Hash
      • Encode/Decode
      • Compress/Decompress
      • Working With Weird Filenames
      • Output Formatting / Filtering
      • File Formatting
      • Operators
  • ⛓️Network
    • Traffic Manipulation
      • iptables
        • Option List
        • General Commands
        • Filter Tables
        • NAT
        • Mangle
        • Filter for SSH Traffic (Example)
      • nftables
    • Packet Capture
      • Syntax
      • TCPDump Examples
    • Packet Analysis
      • Wireshark
  • 🚗Maneuver
    • SSH
    • Control Sockets
    • RDP
    • Windows Port Proxy
  • 🛩️Data Transfer
    • SCP
    • FTP
    • Netcat
      • Netcat Relays
    • Server Interactions
    • Alternate Methods
  • 🪄REGEX
    • Examples
Powered by GitBook
On this page
  • User Accounts
  • Groups
  • Default Groups

Was this helpful?

  1. Windows
  2. System Ops
  3. Users & Groups

Modify

User Accounts

net user [UserName] [password] /add

Add new user (use * for password for secure prompt)

New-LocalUser "UserName"

Add new user

net user [UserName] /delete

Delete user

Remove-LocalUser "UserName"

Delete user

net user [UserName] [Password]

Change password

Set-LocalUser "User" -Password "Password"

Change password

net user UserName /active:yes

Activate user account

Enable-LocalUser "UserName"

Activate user account

net user [UserName[ /active:no

Disable user account

Disable-LocalUser "UserName"

Disable user account

net user user /comment:"comment" moe

Add comment

net user [UserName] /times:[Day],[TIME]

Set logon time for Users. Day=M,T,W,Th,F,Sa,Su Time=3PM-11PM or 15-23

net user UserName /expires:never

Set account to never expire.

net user UserName /expires:date

Set account expiration date.

net accounts /maxpwage:days

Set max password age.

net accounts /minpwage:days

Set min password age.

net accounts /minpwlen:length

Set min password length.

net accounts /uniquepw:number

Set password history length.

dsadd user "UserDN"

Add new AD user

New-ADUser -Name "UserName"

Add new AD user

dsrm "UserDN"

Delete AD user

Remove-ADUser -Identity "UserName"

Delete AD user

dsmod user "UserDN" -mustchpwd yes

Force password change at next logon.

dsmod user "UserDN" -pwd NewPassword

Change AD user password.

dsmod user "UserDN" -disabled no

Enable AD user account.

Enable-ADAccount -Identity "UserName"

Enable AD user account.

dsmod user "UserDN" -disabled yes

Disable AD user account.

Disable-ADAccount -Identity "UserName"

Disable AD user account.

Set AD user password:

Set-ADUser "UserName" -AccountPassword (ConvertTo-SecureString "NewPassword" -AsPlainText -Force)

Groups

net localgroup GroupName /add

Create local group.

New-LocalGroup -Name "GroupName"

Create local group.

net localgroup GroupName /delete

Delete local group.

Remove-LocalGroup -Name "GroupName"

Delete local group.

net localgroup "Power Users" /add moe

Add user to local group.

Add-LocalGroupMember -Group "GroupName" -Member "UserName"

Add user to local group.

net localgroup "Users" /delete larry

Remove user from local group.

Remove-LocalGroupMember -Group "GroupName" -Member "UserName"

Remove user from local group.

net group GroupName /add

Create AD group (on domain controllers).

New-ADGroup -Name "GroupName"

Create AD group (requires Active Directory module).

dsadd group "GroupDN"

Create AD group.

net group GroupName /delete

Delete AD group (on domain controllers).

Remove-ADGroup -Identity "GroupName"

Delete AD group.

dsrm "GroupDN"

Delete AD group.

net group GroupName UserName /add

Add user to AD group (on domain controllers).

Add-ADGroupMember -Identity "GroupName" -Members "UserName"

Add user to AD group.

dsmod group "GroupDN" -addmbr "UserDN"

Add user to AD group.

Set-ADGroup -Identity "GroupName" -Add @{member="CN=UserName"}

Add user to AD group.

net group GroupName UserName /delete

Remove user from AD group (on domain controllers).

Remove-ADGroupMember -Identity "GroupName" -Members "UserName"

Remove user from AD group.

dsmod group "GroupDN" -rmmbr "UserDN"

Remove user from AD group.

Set-ADGroup -Identity "GroupName" -Remove @{member="CN=UserName"}

Remove user from AD group.

Default Groups

Group Name
Description

Administrators

Full system access and administrative privileges.

Users

Standard user access with limited privileges.

Guests

Limited access for guest users.

Power Users

Legacy group with limited administrative privileges.

Backup Operators

Rights to backup and restore files, regardless of permissions.

Replicator

Supports file replication in a domain environment.

Remote Desktop Users

Permission to access the system via Remote Desktop.

Network Configuration Operators

Authority to configure network settings.

Performance Monitor Users

Can monitor system performance.

Performance Log Users

Can manage performance logs and counters.

IIS_IUSRS

Permissions for IIS web server processes.

Cryptographic Operators

Can perform cryptographic operations.

Event Log Readers

Can read event logs.

Certificate Service DCOM Access

Provides DCOM access for Certificate Services.

Distributed COM Users

Members can launch and configure DCOM applications.

Enterprise Read-only Domain Controllers

Contains RODCs from the entire forest.

Domain Admins

Administrators for the domain.

Domain Users

Regular user accounts in the domain.

Domain Guests

Guests in the domain.

Domain Computers

Contains all computer accounts in the domain.

Domain Controllers

All domain controller accounts in the domain.

Read-only Domain Controllers

Contains RODCs for the domain.

Enterprise Admins

Highest level of administrative privileges across all domains in the forest.

Schema Admins

Can modify the schema within the Active Directory forest.

Group Policy Creator Owners

Can create and modify group policy objects.

RAS and IAS Servers

Servers running RAS and IAS services.

Server Operators

Limited administrative privileges on servers.

Account Operators

Can manage user and group accounts, but not administrative accounts.

Print Operators

Can manage printers and print queues.

Incoming Forest Trust Builders

Can create incoming, one-way trusts to this forest.

PreviousEnumerateNextNetwork

Last updated 1 year ago

Was this helpful?

🪟