Finding Users
Assuming port scan is running or done, and we know we're in an AD environment
Find Users
cme IP -u '' -p '' --usersenum4linux -A $targetlookupsids DOMAIN/guest@$targetrpcclient -U “” $target
enumdomusersldapsearch -x -h $target -b base namingcontextnmap -p 88 --script=krb5-enum-users --script-args="krb5-enum-users.realm='<domain>',userdb=<users_list_file>" <ip> Else if no names from either, once you start finding names, make a list and use namemash.py to create a username list
kerbrute userenum -d domain.name --dc $target usernamelist.txtGet Pass Pol
cme IP -u '' -p '' --pass-pollDump LDAP
windapsearch
# query users
windapsearch -m users --dc DCIP
# query login names
windapsearch -m users --attrs UserPrincipalName --dc DCIP | awk -F"Name:" '{print $2}' | awk '!/^$/'
# descriptions (often contain passwords)
windapsearch -m users --attrs Description --dc DCIP
# query all attributes for password
windapsearch -m users --full --dc DCIP | grep -i passwordLast updated