Credentialed Enumeration From Windows
Active Directory Credentialed Enumeration (Windows)
1️⃣ PowerShell & Active Directory Module
PowerShell’s built-in ActiveDirectory
module provides essential tools for querying and managing Active Directory objects.
Loading the Module
Get-Module
→ Lists available PowerShell modulesImport-Module ActiveDirectory
→ Loads the Active Directory module if not already imported
Domain & User Enumeration
Get-ADDomain
→ Displays general domain informationGet-ADTrust -Filter *
→ Checks for domain trust relationshipsGet-ADUser -Filter {ServicePrincipalName -ne "$null"} -Properties ServicePrincipalName
→ Identifies Kerberoastable accountsGet-ADGroup -Filter * | Select-Object Name
→ Lists all AD groupsGet-ADGroup -Identity "Administrators"
→ Retrieves details of a specific groupGet-ADGroupMember -Identity "Domain Admins"
→ Lists members of a specified group
2️⃣ PowerView
PowerView is a robust PowerShell tool used for Active Directory reconnaissance.
Basic Enumeration Commands
Get-Domain
→ Retrieves details about the Active Directory domainGet-DomainUser
→ Lists users in the domainGet-DomainComputer
→ Enumerates domain-joined computersGet-DomainController
→ Identifies domain controllersGet-DomainGroup
→ Lists all domain groupsGet-DomainOU
→ Enumerates Organizational Units (OUs)Find-InterestingDomainAcl
→ Detects modification rights in domain ACLs
Privilege & Access Enumeration
Find-DomainUserLocation
→ Identifies machines where users are logged inFind-DomainShare
→ Discovers accessible file shares in the domainFind-InterestingDomainShareFile
→ Searches for potentially sensitive files in sharesTest-AdminAccess
→ Verifies administrative privileges on a remote machine
Trust & Group Membership Analysis
Get-DomainTrust
→ Retrieves domain trust relationshipsGet-ForestTrust
→ Identifies forest-level trust relationshipsGet-DomainForeignUser
→ Lists users who belong to groups outside their primary domainGet-DomainForeignGroupMember
→ Finds groups with members from outside domainsGet-DomainTrustMapping
→ Maps domain trust relationships
3️⃣ SharpView
SharpView is a .NET alternative to PowerView, offering similar enumeration functionality in a compiled format.
.\SharpView.exe Get-DomainUser -Identity "john.doe"
→ Retrieves details about a specific user
4️⃣ BloodHound & SharpHound
BloodHound is a powerful tool used for visualizing Active Directory attack paths. The SharpHound.exe
collector gathers necessary information.
.\SharpHound.exe -c All --zipfilename DataCollection
→ Executes full AD enumeration
Once collected, transfer the results to an attacker-controlled machine and analyze them in BloodHound.
5️⃣ Snaffler - File Scavenging Tool
Snaffler automates the discovery of sensitive files within an Active Directory environment.
Snaffler.exe -s -d corp.local -o findings.log -v data
→ Runs a deep scan for valuable files
6️⃣ Additional Recon Tools & Methods
General System Enumeration
Get-NetLocalGroup
→ Lists local groups on a machineGet-NetLocalGroupMember
→ Enumerates members of a local groupGet-NetShare
→ Identifies accessible shared directoriesGet-NetSession
→ Retrieves active session details on a machine
Service Principal Name (SPN) Enumeration
Get-DomainSPNTicket
→ Requests Kerberos tickets for Service Principal Name (SPN) accounts (potential Kerberoasting targets)
By leveraging these techniques, an attacker or pentester can gather valuable information about an Active Directory environment while minimizing detection. 🚀
Last updated
Was this helpful?