PowerUpSQL.psd1
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 |
#requires -Version 1 @{ ModuleToProcess = 'PowerUpSQL.psm1' ModuleVersion = '1.103.8' GUID = 'dd1fe106-2226-4869-9363-44469e930a4a' Author = 'Scott Sutherland' Copyright = 'BSD 3-Clause' Description = 'PowerUpSQL is an offensive toolkit designed for attacking SQL Server. The PowerUpSQL module includes functions that support SQL Server discovery, auditing for common weak configurations, and privilege escalation on scale. It is intended to be used during penetration tests and red team engagements. However, PowerUpSQL also includes many functions that could be used by administrators to inventory the SQL Servers on their ADS domain very quickly. More information can be found at https://github.com/NetSPI/PowerUpSQL.' PowerShellVersion = '2.0' FunctionsToExport = @( 'Create-SQLFileXpDll', 'Create-SQLFileCLRDll', 'Get-SQLAgentJob', 'Get-SQLAssemblyFile', 'Get-SQLAuditDatabaseSpec', 'Get-SQLAuditServerSpec', 'Get-SQLColumn', 'Get-SQLColumnSampleData', 'Get-SQLColumnSampleDataThreaded', 'Get-SQLConnectionTest', 'Get-SQLConnectionTestThreaded', 'Get-SQLDatabase', 'Get-SQLDatabasePriv', 'Get-SQLDatabaseRole', 'Get-SQLDatabaseRoleMember', 'Get-SQLDatabaseSchema', 'Get-SQLDatabaseThreaded', 'Get-SQLDatabaseUser', 'Get-SQLDomainObject', 'Get-SQLDomainComputer', 'Get-SQLDomainUser', 'Get-SQLDomainSubnet', 'Get-SQLDomainSite', 'Get-SQLDomainGroup', 'Get-SQLDomainOu', 'Get-SQLDomainAccountPolicy', 'Get-SQLDomainTrust', 'Get-SQLDomainPasswordsLAPS', 'Get-SQLDomainController', 'Get-SQLDomainExploitableSystem', 'Get-SQLDomainGroupMember', 'Get-SQLFuzzDatabaseName', 'Get-SQLFuzzDomainAccount', 'Get-SQLFuzzObjectName', 'Get-SQLFuzzServerLogin' 'Get-SQLInstanceBroadcast', 'Get-SQLInstanceDomain', 'Get-SQLInstanceFile', 'Get-SQLInstanceLocal', 'Get-SQLInstanceScanUDP', 'Get-SQLInstanceScanUDPThreaded', 'Get-SQLLocalAdminCheck', 'Get-SQLOleDbProvder', 'Get-SQLQuery', 'Get-SQLQueryThreaded', 'Get-SQLRecoverPwAutoLogon', 'Get-SQLServerConfiguration', 'Get-SQLServerCredential', 'Get-SQLServerInfo', 'Get-SQLServerInfoThreaded', 'Get-SQLServerLink', 'Get-SQLServerLinkCrawl', 'Get-SQLServerLinkData', 'Get-SQLServerLinkQuery', 'Get-SQLServerLogin', 'Get-SQLServerLoginDefaultPw', 'Get-SQLServerPasswordHash', 'Get-SQLServerPolicy', 'Get-SQLServerPriv', 'Get-SQLServerRole', 'Get-SQLServerRoleMember', 'Get-SQLServiceAccount', 'Get-SQLServiceLocal', 'Get-SQLSession', 'Get-SQLStoredProcedure', 'Get-SQLStoredProcedureCLR', 'Get-SQLStoredProcedureSQLi', 'Get-SQLStoredProcedureAutoExec', 'Get-SQLStoredProcedureXp', 'Get-SQLSysadminCheck', 'Get-SQLTable', 'Get-SQLTriggerDdl', 'Get-SQLTriggerDml', 'Get-SQLView', 'Invoke-SQLAudit', 'Invoke-SQLAuditPrivCreateProcedure', 'Invoke-SQLAuditPrivDbChaining', 'Invoke-SQLAuditPrivImpersonateLogin', 'Invoke-SQLAuditPrivServerLink', 'Invoke-SQLAuditPrivTrustworthy', 'Invoke-SQLAuditPrivXpDirtree', 'Invoke-SQLAuditPrivXpFileexit', 'Invoke-SQLAuditRoleDbDdlAdmin', 'Invoke-SQLAuditRoleDbOwner', 'Invoke-SQLAuditSampleDataByColumn', 'Invoke-SQLAuditWeakLoginPw', 'Invoke-SQLAuditSQLiSpExecuteAs', 'Invoke-SQLAuditSQLiSpSigned', 'Invoke-SQLAuditDefaultLoginPw', 'Invoke-SQLAuditPrivAutoExecSp', 'Invoke-SQLDumpInfo', 'Invoke-SQLEscalatePriv', 'Invoke-SQLImpersonateService', 'Invoke-SQLImpersonateServiceCmd', 'Invoke-SQLUncPathInjection', 'Invoke-SQLOSCmd', 'Invoke-SQLOSCmdCLR', 'Invoke-SQLOSCmdCOle', 'Invoke-SQLOSCmdPython', 'Invoke-SQLOSCmdR', 'Invoke-SQLOSCmdAgentJob', 'Invoke-TokenManipulation' ) FileList = 'PowerUpSQL.psm1', 'PowerUpSQL.ps1', 'README.md' } |