Enumeration Commands
ActiveDirectory Enumeration Notes
Get information about an AD group
Get-ADGroup -Identity "<GROUP NAME" -Properties *View a user's current rights
whoami /privCheck if RSAT installed
Get-WindowsCapability -Name RSAT* -Online | Select-Object -Property Name, StateInstall all RSAT tools
Get-WindowsCapability -Name RSAT* -Online | Add-WindowsCapability –OnlineLDAP query to return all AD groups
Get-ADObject -LDAPFilter '(objectClass=group)' | select cnFind another disabled user (first.last).
Get-ADUser -LDAPFilter '(userAccountControl:1.2.840.113556.1.4.803:=2)' | select name
#OID REFERENCE https://ldapwiki.com/wiki/OIDRun a utility as another user
runas /netonly /user:DOMAIN\USERNAME powershellCount all users in an OU
Count all users in Domain
Count all computers in Domain
Count all groups in Domain
Query for installed software
Get hostnames with the word "SQL" in their hostname; Change SQL for whatever hostname you're looking for
Get all administrative groups
Find admin users that don't require Kerberos Pre-Auth
Get SID for computer
Enumerate UAC values for admin users
Get AD groups using WMI
Use ADSI to search for all computers
Find all trusted users or computers marked trusted for delegation
Find users with blank passwords
Recursive search of groups a user is apart of
UserAccountControl Attributes

Password Not Required
Nested Groups
Last updated
Was this helpful?