for key in *id_rsa; do ssh-keygen -p -f "$key" -N "" -o ; done
Windows
# Get PS Version$PSversiontable
---
# Processes or Task Listtasklist /V | findstr <KEYWORD>
# Current User Infowhoami;hostname
whoami /priv # Show current user's privilegeswhoami /groups # Show current user's group memberships# List Users & Groupsnet user # List all local usersnet localgroup # List all local groupsnet localgroup | findstr admin
net localgroup "<GROUP>"net localgroup administrators # List members of the Administrators group# Password & Account Policynet accounts # (Local policy)net accounts /domain # (Domain policy)# Sharesnet share # Shares by current computernet use # External connected sharesGet-SmbMapping # Same but in PowerShellGet-PSDrive -PSProvider FileSystem
# Map drivenet use <DRIVE>: \\<TARGET>\<SHARE>
net use <DRIVE>: \\<TARGET>\<SHARE> /user:<USER> <PASSWORD>
# Map driveNew-PSDrive -PSProvider "FileSystem" -Name "<DRIVE>" -Root "\\<TARGET>\<SHARE>"$secpassword = ConvertTo-SecureString -AsPlainText -Force '<PASSWORD>'$cred = New-Object System.Management.Automation.PSCredential '<USERNAME>', $secpassword
New-PSDrive -PSProvider "FileSystem" -Credential $cred -Name "<DRIVE>" -Root "\\<TARGET>\<SHARE>"# Search filenamesdir /s /b <DRIVE>:\*<KEYWORD>*
Get-ChildItem -Recurse -File -Path <DRIVE>:\ -Include *<KEYWORD>*
# Search keyword in filesfindstr /s /i <KEYWORD> <DRIVE>:\*.*
Get-ChildItem -Recurse -Path <DRIVE>:\ | Select-String -Pattern "<KEYWORD>"
Change User Password
via rpcclient with ForceChangePassword perm
This will only work without the user’s old password if the authenticating user has the ForceChangePassword permission at the domain level (or obviously if the user is a Domain Administrator):