7. Dump Domain Information via LDAP
Last updated
Last updated
Since you now have valid credentials (alfredo@megachange.nyx
), itβs time to enumerate the AD environment using ldapdomaindump
.
With these credentials, we can query LDAP
to extract detailed Active Directory information, such as: domain users
, groups
, and computer objects
to map the AD environment.
Active Directory enumeration tool that extracts and dumps domain information via LDAP
Use backslashes (
\
) after the domain name.
Tips:
Review files like domain_users.html
.
Look for high-privileged groups like Domain Admins
or interesting users like sysadmin
.
This command creates a folder with several .json
and .html
files, such as:
domain_users.html
β All users, look for interesting accounts like admin
, svc
, backup
.
domain_groups.html
β Lists groups. Find groups like:
Domain Admins
Enterprise Admins
Server Operators
computers.json
β Lists domain-joined machines (targets π₯οΈ).