Enumeration

Powershell

Users

net user /domain
net user zoe.marshall /domain

Groups

net group /domain
net group "Tier 1 Admins" /domain

Enumeration Tools

Domain Information

Retrieve basic domain details:

Domain Policies

Retrieve domain policy details such as password requirements and lockout thresholds:

Domain Controllers (DCs)

Identify domain controllers:

User Type
Hex Value
Constants

Normal User

0x200

512

Workstation/Server

0x1000

4096

Domain Controller

0x82000

532480


User and Group Enumeration

User Accounts

Account Type
Identifier
Constant

Temporary Duplicate Account

UF_TEMP_DUPLICATE_ACCOUNT

256

Normal Account

UF_NORMAL_ACCOUNT

512

Interdomain Trust Account

UF_INTERDOMAIN_TRUST_ACCOUNT

2048

Workstation Trust Account

UF_WORKSTATION_TRUST_ACCOUNT

4096

Server Trust Account

UF_SERVER_TRUST_ACCOUNT

8192

List all user accounts:

List user accounts in a specific domain (e.g., "infected"):

Currently Logged-On Users

Enumerate currently logged-on users (e.g., users on domain "infected"):

Groups

Enumerate groups:

Find users in the "Domain Admins" group:

Find groups containing a specific user (e.g., "Administrator"):


Machine Enumeration

Find Machines in the Domain

Retrieve a list of all machines in the domain:

Enumerate Admin Privileges Across AD

Identify machines in the domain where the user has admin privileges:


This organization separates tools, commands, and their purposes into logical sections, making it easier to navigate and use. Let me know if you'd like to refine this further!

Last updated