Before you attack Active Directory, you need to understand it. AD enumeration is the process of discovering users, groups, computers, policies, and relationships that make up the domain. The more you know, the better your attack paths.
The beauty of AD? By design, any authenticated user can query most information. You don't need admin rights to enumerate - just any valid domain account.
Enumeration is Key
In enterprise environments, 80% of time should be spent on enumeration. Finding the right attack path matters more than having fancy exploits.
Basic Domain Enumeration
Windows Built-in Tools
PowerShell AD Module
LDAP Enumeration
LDAP is the protocol AD uses for queries. You can use it directly from Linux or without the AD module.
Key Objects to Enumerate
Users
Groups
Computers
GPOs
Descriptions Are Gold
User and computer descriptions often contain passwords, hints, or sensitive information. Always check them!
Linux Enumeration Tools
Finding Attack Targets
Stealth Considerations
Extensive LDAP queries may trigger alerts. In red team ops, spread queries over time and avoid obvious patterns. BloodHound does efficient batch collection.
Enumeration Methodology
AD Enumeration Process
1
Domain InfoIdentify domain name, DCs, forest structure
2
UsersEnumerate all users, find admins and service accounts
3
GroupsMap privileged groups and memberships
4
ComputersFind DCs, servers, workstations
5
TargetsIdentify Kerberoastable, AS-REP roastable accounts
6
TrustsMap trust relationships
7
ACLsUse BloodHound for attack path analysis
Knowledge Check
Challenges
Key Takeaways
- Any domain user can enumerate most AD information
- LDAP (389/636) and RPC are primary enumeration protocols
- Key targets: Domain Admins, SPNs, delegation, descriptions with passwords
- PowerView and CrackMapExec are essential tools
- User descriptions often contain passwords or hints
- BloodHound automates attack path discovery