Discovery
The adversary is trying to figure out your environment. https://attack.mitre.org/tactics/TA0007/
User Group Membership
Get-ADPrincipalGroupMembership "USERNAME" | Select nameMachineAccountQuote Lookup
$domain = "burmat.local"
$domainDN = (Get-ADDomain -Identity $domain).DistinguishedName
$addMachineQuota = (Get-ADObject -Identity $domainDN -Properties ms-DS-MachineAccountQuota).'ms-DS-MachineAccountQuota'
Write-Host "Current AddMachineQuota value: $addMachineQuota"AD Enumeration via ADSI DirectorySearcher
DirectorySearcher$users = ([adsisearcher]"<LDAP QUERY HERE>").FindAll();Computer/User Objects
([adsisearcher]'(&(objectCategory=Computer))').FindAll();
([adsisearcher]'(&(objectCategory=User))').FindAll();SPNs
Unconstrained delegation
Local Administrator Password Solution (LAPS)
BOFHound
BloodHound
Ingester Launch
LDAP Enumeration
Null Sessions
LDAP Queries
Domain Usernames
ASREPRoast
Users with SPNs
User / Computers with Unconstrained Delegation
Domain Administrators
PowerSploit
Get Domain Users
Retrieve Group Members
Users Allowed to Delegate
User Description Gathering
Enumerate User DACLs
SPN Ticket Request (Kerberoasting)
Domain Controller Discovery
Domain Computers
Unconstrained Delegation (Other than DCs)
Network Shares Enumeration
theHarvester
Email Address Gathering
Web Enumeration
aquatone
Sonar
EyeWitness
Network Discovery
Shodan
SPF/DMARC/DKIM
DNS Zone Transfer
Windows
Linux
ARP
masscan
Last updated