Retrieve domain policy details such as password requirements and lockout thresholds:
Domain Controllers (DCs)
Identify domain controllers:
User Type
Hex Value
Constants
Normal User
0x200
512
Workstation/Server
0x1000
4096
Domain Controller
0x82000
532480
User and Group Enumeration
User Accounts
Account Type
Identifier
Constant
Temporary Duplicate Account
UF_TEMP_DUPLICATE_ACCOUNT
256
Normal Account
UF_NORMAL_ACCOUNT
512
Interdomain Trust Account
UF_INTERDOMAIN_TRUST_ACCOUNT
2048
Workstation Trust Account
UF_WORKSTATION_TRUST_ACCOUNT
4096
Server Trust Account
UF_SERVER_TRUST_ACCOUNT
8192
List all user accounts:
List user accounts in a specific domain (e.g., "infected"):
Currently Logged-On Users
Enumerate currently logged-on users (e.g., users on domain "infected"):
Groups
Enumerate groups:
Find users in the "Domain Admins" group:
Find groups containing a specific user (e.g., "Administrator"):
Machine Enumeration
Find Machines in the Domain
Retrieve a list of all machines in the domain:
Enumerate Admin Privileges Across AD
Identify machines in the domain where the user has admin privileges:
This organization separates tools, commands, and their purposes into logical sections, making it easier to navigate and use. Let me know if you'd like to refine this further!