Finding Users

  • Assuming port scan is running or done, and we know we're in an AD environment

Find Users

cme IP -u '' -p '' --users
enum4linux -A $target
lookupsids DOMAIN/guest@$target
rpcclient -U “” $target
enumdomusers
ldapsearch -x -h $target -b base namingcontext
nmap -p 88 --script=krb5-enum-users --script-args="krb5-enum-users.realm='<domain>',userdb=<users_list_file>" <ip> 
  • Else if no names from either, once you start finding names, make a list and use namemash.py to create a username list

kerbrute userenum -d domain.name --dc $target usernamelist.txt

Get Pass Pol

cme IP -u '' -p '' --pass-poll

Dump LDAP

  • windapsearch

# query users
windapsearch -m users --dc DCIP

# query login names
windapsearch -m users --attrs UserPrincipalName --dc DCIP | awk -F"Name:" '{print $2}' | awk '!/^$/'

# descriptions (often contain passwords)
windapsearch -m users --attrs Description --dc DCIP

# query all attributes for password
windapsearch -m users --full --dc DCIP | grep -i password

Last updated