Enumeration Commands

ActiveDirectory Enumeration Notes

Get information about an AD group

Get-ADGroup -Identity "<GROUP NAME" -Properties *

View a user's current rights

whoami /priv

Check if RSAT installed

Get-WindowsCapability -Name RSAT* -Online | Select-Object -Property Name, State

Install all RSAT tools

Get-WindowsCapability -Name RSAT* -Online | Add-WindowsCapability –Online

LDAP query to return all AD groups

Get-ADObject -LDAPFilter '(objectClass=group)' | select cn

Find another disabled user (first.last).

Get-ADUser -LDAPFilter '(userAccountControl:1.2.840.113556.1.4.803:=2)' | select name

#OID REFERENCE https://ldapwiki.com/wiki/OID

Run a utility as another user

runas /netonly /user:DOMAIN\USERNAME powershell

Count all users in an OU

Count all users in Domain

Count all computers in Domain

Count all groups in Domain

Query for installed software

Get hostnames with the word "SQL" in their hostname; Change SQL for whatever hostname you're looking for

Get all administrative groups

Find admin users that don't require Kerberos Pre-Auth

Get SID for computer

Enumerate UAC values for admin users

Get AD groups using WMI

Use ADSI to search for all computers

Find all trusted users or computers marked trusted for delegation

Find users with blank passwords

Recursive search of groups a user is apart of

UserAccountControl Attributes

UAC Attributes

Password Not Required

Nested Groups

Last updated

Was this helpful?