Closed cmwg71 closed 4 years ago
It should be fixed now. At least when executed from PSWinDocumentation.AD. I'll take a look at PSWinDocumentation alone later. Tested with the newest hash DB.
Let me know how it goes.
The recommended way would be to use - as it may be simpler.
# Using built-in password list (just one password P@ssw0rd!)
$Passwords = Invoke-ADPasswordAnalysis
$Passwords.'ad.evotec.xyz'.DomainPasswordDuplicatePasswordGroups | Format-Table -AutoSize 'Duplicate Group', *
$Passwords.'ad.evotec.xyz' | Format-Table *
return
# Using a list of passwords
$PathToPasswords = 'C:\Support\GitHub\PSWinDocumentation.AD\Ignore\Passwords.txt'
$Passwords = Invoke-ADPasswordAnalysis -PathToPasswords $PathToPasswords
$Passwords.'ad.evotec.xyz' | Format-Table
return
# Using Hashes from IHaveBeenPwned
$PathToPasswordsHashes = 'C:\Users\przemyslaw.klys\Downloads\pwned-passwords-ntlm-ordered-by-hash-v6\pwned-passwords-ntlm-ordered-by-hash-v6.txt'
$Passwords = Invoke-ADPasswordAnalysis -PathToPasswords $PathToPasswordsHashes -UseNTLMHashes
$Passwords.'ad.evotec.xyz' | Format-Table
hello,
i installed your module PSWinDocumentation especially for the pwned statistics. I have the following in the ps1:
but the script does not aggregate the pwned hashes into statistics. It seems to be completely ignoring this part.