Credentialed Enumeration
Linux
CrackMapExec
Domain User Enumeration
$ sudo crackmapexec smb 172.16.5.5 -u forend -p Klmcargo2 --users
SMB 172.16.5.5 445 ACADEMY-EA-DC01 [*] Windows 10.0 Build 17763 x64 (name:ACADEMY-EA-DC01) (domain:INLANEFREIGHT.LOCAL) (signing:True) (SMBv1:False)
SMB 172.16.5.5 445 ACADEMY-EA-DC01 [+] INLANEFREIGHT.LOCAL\forend:Klmcargo2
SMB 172.16.5.5 445 ACADEMY-EA-DC01 [+] Enumerated domain user(s)
SMB 172.16.5.5 445 ACADEMY-EA-DC01 INLANEFREIGHT.LOCAL\administrator badpwdcount: 0 baddpwdtime: 2022-03-29 12:29:14.476567
SMB 172.16.5.5 445 ACADEMY-EA-DC01 INLANEFREIGHT.LOCAL\guest badpwdcount: 0 baddpwdtime: 1600-12-31 19:03:58
SMB 172.16.5.5 445 ACADEMY-EA-DC01 INLANEFREIGHT.LOCAL\lab_adm badpwdcount: 0 baddpwdtime: 2022-04-09 23:04:58.611828
SMB 172.16.5.5 445 ACADEMY-EA-DC01 INLANEFREIGHT.LOCAL\krbtgt badpwdcount: 0 baddpwdtime: 1600-12-31 19:03:58
SMB 172.16.5.5 445 ACADEMY-EA-DC01 INLANEFREIGHT.LOCAL\htb-student badpwdcount: 0 baddpwdtime: 2022-03-30 16:27:41.960920
SMB 172.16.5.5 445 ACADEMY-EA-DC01 INLANEFREIGHT.LOCAL\avazquez badpwdcount: 3 baddpwdtime: 2022-02-24 18:10:01.903395
<SNIP>Domain Group Enumeration
Logged on Users
Share Searching
SMBMap
SMBMap To Check Access
Recursive List Of All Directories
RPCClient
RPCClient User Enumeration By RID
Enumdomusers
Impacket Toolkit
psexec.py
wmiexec.py
Windapsearch
Windapsearch - Domain Admins
Windapsearch - Privileged Users
Bloodhound.py
Executing BloodHound.py
Viewing the Results
Windows
Active Directory Powershell Module
Discover Modules
Load Modules
Get Domain Info
Get-ADUser
Checking For Trust Relationships
Group Enumeration
Detailed Group Info
Group Membership
PowerView
Domain User Information
Recursive Group Membership
Trust Enumeration
Testing for Local Admin Access
Finding Users With SPN Set
SharpView
Snaffler
Bloodhound
SharpHound in Action
Unsupported Operating Systems

Local Admins

Last updated

