Active Directory Enumeartion
This section covers practical techniques for enumerating Active Directory environments during internal assessments. It includes multiple methods to extract information about domain users, groups, computers, trusts, and permissions using tools like rpcclient, ldapsearch, BloodHound, and PowerView. These enumeration steps are essential for identifying attack paths, privilege escalation opportunities, and domain misconfigurations — particularly in OSCP-style labs and real-world engagements.
tip
Before starting enumeartion make sure to bypass powershell execution using command powershell -ep bypass. Then you'll be able to import scripts like Import-Module .\PowerView.ps1 and execute them.
Manual Enumeartion
Using Windows Built In commands
net user /domain
net group /domain
net group "Domain Admins" /domain
net computer /domain
nltest /domain_trusts