Valid Credentials

Enumeration

Using Windows Legacy Tools

net user /domain
net user <USERNAME> /domain
net group /domain
net group "<GROUP>" /domain

PowerView

Get Domain Information

Get-NetDomain

Get User List

Get-NetUser

Get a specific User

Get-NetUser "user"

Enumerate Password Change && Last Login

Get-NetUser | select cn,pwdlastset,lastlogon

Get Groups

Get a specific Group

Get Members of groups

List Domain Shares

Get Computer Objects

Check if we are ADMIN on other Computers

Check for Logged Users

Enumerate ACL

In order to make sense of the SID, we can use PowerView's Convert-SidToName command to convert it to an actual domain object name:

Enumerate GenericAll in the domain

Enumerate SPN

Service Principal Name (SPN) Enumeration

Get all the users

Enumerate SMB Shares

BloodHound

Kerberoasting

Get Kerberoastable users

Get Hash

If impacket-GetUserSPNs throws the error "KRB_AP_ERR_SKEW(Clock skew too great)," we need to synchronize the time of the Kali machine with the domain controller. We can use rdatearrow-up-right to do so.

ADCS Enumeration

Exploit

If we found known vulnerabilities you should exploit them for compromising more systems:

Known Vulnerabilities

Connect to computers

Lateral Move

WinPeas

Upload WinPeas for more in depth enumeration

LDAP

Change User Password

If we got "STATUS_PASSWORD_MUST_CHANGE" for some users, we can update a current password to a new one.

Last updated