forked from NetSPI/PowerUpSQL
-
Notifications
You must be signed in to change notification settings - Fork 0
/
PowerUpSQL.psd1
116 lines (115 loc) · 4.56 KB
/
PowerUpSQL.psd1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
#requires -Version 1
@{
ModuleToProcess = 'PowerUpSQL.psm1'
ModuleVersion = '1.103.10'
GUID = 'dd1fe106-2226-4869-9363-44469e930a4a'
Author = 'Scott Sutherland'
Copyright = 'BSD 3-Clause'
Description = 'PowerUpSQL is an offensive toolkit designed for attacking SQL Server. The PowerUpSQL module includes functions that support SQL Server discovery, auditing for common weak configurations, and privilege escalation on scale. It is intended to be used during penetration tests and red team engagements. However, PowerUpSQL also includes many functions that could be used by administrators to inventory the SQL Servers on their ADS domain very quickly. More information can be found at https://github.com/NetSPI/PowerUpSQL.'
PowerShellVersion = '2.0'
FunctionsToExport = @(
'Create-SQLFileXpDll',
'Create-SQLFileCLRDll',
'Get-SQLAgentJob',
'Get-SQLAssemblyFile',
'Get-SQLAuditDatabaseSpec',
'Get-SQLAuditServerSpec',
'Get-SQLColumn',
'Get-SQLColumnSampleData',
'Get-SQLColumnSampleDataThreaded',
'Get-SQLConnectionTest',
'Get-SQLConnectionTestThreaded',
'Get-SQLDatabase',
'Get-SQLDatabasePriv',
'Get-SQLDatabaseRole',
'Get-SQLDatabaseRoleMember',
'Get-SQLDatabaseSchema',
'Get-SQLDatabaseThreaded',
'Get-SQLDatabaseUser',
'Get-SQLDomainObject',
'Get-SQLDomainComputer',
'Get-SQLDomainUser',
'Get-SQLDomainSubnet',
'Get-SQLDomainSite',
'Get-SQLDomainGroup',
'Get-SQLDomainOu',
'Get-SQLDomainAccountPolicy',
'Get-SQLDomainTrust',
'Get-SQLDomainPasswordsLAPS',
'Get-SQLDomainController',
'Get-SQLDomainExploitableSystem',
'Get-SQLDomainGroupMember',
'Get-SQLFuzzDatabaseName',
'Get-SQLFuzzDomainAccount',
'Get-SQLFuzzObjectName',
'Get-SQLFuzzServerLogin'
'Get-SQLInstanceBroadcast',
'Get-SQLInstanceDomain',
'Get-SQLInstanceFile',
'Get-SQLInstanceLocal',
'Get-SQLInstanceScanUDP',
'Get-SQLInstanceScanUDPThreaded',
'Get-SQLLocalAdminCheck',
'Get-SQLOleDbProvder',
'Get-SQLQuery',
'Get-SQLQueryThreaded',
'Get-SQLRecoverPwAutoLogon',
'Get-SQLServerConfiguration',
'Get-SQLServerCredential',
'Get-SQLServerInfo',
'Get-SQLServerInfoThreaded',
'Get-SQLServerLink',
'Get-SQLServerLinkCrawl',
'Get-SQLServerLinkData',
'Get-SQLServerLinkQuery',
'Get-SQLServerLogin',
'Get-SQLServerLoginDefaultPw',
'Get-SQLServerPasswordHash',
'Get-SQLServerPolicy',
'Get-SQLServerPriv',
'Get-SQLServerRole',
'Get-SQLServerRoleMember',
'Get-SQLServiceAccount',
'Get-SQLServiceLocal',
'Get-SQLSession',
'Get-SQLStoredProcedure',
'Get-SQLStoredProcedureCLR',
'Get-SQLStoredProcedureSQLi',
'Get-SQLStoredProcedureAutoExec',
'Get-SQLStoredProcedureXp',
'Get-SQLSysadminCheck',
'Get-SQLTable',
'Get-SQLTriggerDdl',
'Get-SQLTriggerDml',
'Get-SQLView',
'Invoke-SQLAudit',
'Invoke-SQLAuditPrivCreateProcedure',
'Invoke-SQLAuditPrivDbChaining',
'Invoke-SQLAuditPrivImpersonateLogin',
'Invoke-SQLAuditPrivServerLink',
'Invoke-SQLAuditPrivTrustworthy',
'Invoke-SQLAuditPrivXpDirtree',
'Invoke-SQLAuditPrivXpFileexit',
'Invoke-SQLAuditRoleDbDdlAdmin',
'Invoke-SQLAuditRoleDbOwner',
'Invoke-SQLAuditSampleDataByColumn',
'Invoke-SQLAuditWeakLoginPw',
'Invoke-SQLAuditSQLiSpExecuteAs',
'Invoke-SQLAuditSQLiSpSigned',
'Invoke-SQLAuditDefaultLoginPw',
'Invoke-SQLAuditPrivAutoExecSp',
'Invoke-SQLDumpInfo',
'Invoke-SQLEscalatePriv',
'Invoke-SQLImpersonateService',
'Invoke-SQLImpersonateServiceCmd',
'Invoke-SQLUncPathInjection',
'Invoke-SQLOSCmd',
'Invoke-SQLOSCmdCLR',
'Invoke-SQLOSCmdCOle',
'Invoke-SQLOSCmdPython',
'Invoke-SQLOSCmdR',
'Invoke-SQLOSCmdAgentJob',
'Invoke-TokenManipulation'
)
FileList = 'PowerUpSQL.psm1', 'PowerUpSQL.ps1', 'README.md'
}