User Recon
This section lists AD user recon techniques for common ports. Finding domain users and their credentials is the most important part of the Active Directory penetration testing.
RCP (139, 445) MS-RPC - The Hacker Recipes
# No password
rpcclient -U '' -N $RHOST
# rpcclient userful commands to enumerate users and groups
>enumdomusers
>enumdomgroups
>querydispinfo
>querydominfo
# With password
rpcclient -U Throwback.local/BlaireJ 10.200.74.117
# Create a usernames.txt
vi enumdomusers.txt
# Copy and paste it to the enumdomusers.txt
cat enumdomusers.txt | cut -d ':' -f 2 | cut -d '[' -f 2 | cut -d ']' -f 1 > usernames.txtSMB (139,445) enum4linux ⚙️ - The Hacker Recipes
SMB (139,445) - Domain Users
Kerberos (88)
See Kerberos attacks section for attack techniques.
LDAP TCP (389)
LDAP TCP (389) - User Description
SSL (443)
Last updated