Users
WINDOWS
User Search
PS C:\> dsquery userChecking User Property
(Property is ServicePrincipalName)
PS C:\> Get-ADUser -Filter {ServicePrincipalName -ne "$null"} -Properties ServicePrincipalNameNET
NETnet user /domain # List all users of the domain
net user <ACCOUNT_NAME> /domain # Get information about a user within the domain
net user %username% # Information about the current userPowerView
Domain User Information
PS C:\> Get-DomainUser -Identity sol -Domain militech.local | Select-Object -Property name,samaccountname,description,memberof,whencreated,pwdlastset,lastlogontimestamp,accountexpires,admincount,userprincipalname,serviceprincipalname,useraccountcontrolTesting for Local Admin Access
PS C:\> Test-AdminAccess -ComputerName MILITECH-MS13Finding Users With SPN Set
PS C:\> Get-DomainUser -SPN -Properties samaccountname,ServicePrincipalNameUsers with no Password
PS C:\> Get-DomainUser -UACFilter PASSWD_NOTREQD | Select-Object samaccountname,useraccountcontrolSharpView
Domain User Information
PS C:\> .\SharpView.exe Get-DomainUser -Identity solLINUX
CrackMapExec
CME Domain User
sudo crackmapexec smb 13.13.13.13 -u sol -p PASSWORD123 --users
sudo crackmapexec smb 13.13.13.13 -u sol -p PASSWORD123 --loggedon-users # Logged onRPCClient
User Enumeration
rpcclient -U "" -N 13.13.13.13 # Get RPC Console
rpcclient $> enumdomusers # Enum all users
rpcclient $> queryuser 0x371 # Enum Specifical User by it's RIDWindapsearch
Domain Admins
python3 windapsearch.py --dc-ip 13.13.13.13 -u sol@militech.local -p PASSWORD123 --daPrivileged Users
python3 windapsearch.py --dc-ip 13.13.13.13 -u sol@militech.local -p PASSWORD123 -PULast updated