<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Credentialed Enumeration on LEIKAH</title><link>https://leikah.haoyingcao.xyz/en/docs/active_directory/credentialed_enum/</link><description>Recent content in Credentialed Enumeration on LEIKAH</description><generator>Hugo</generator><language>en</language><atom:link href="https://leikah.haoyingcao.xyz/en/docs/active_directory/credentialed_enum/index.xml" rel="self" type="application/rss+xml"/><item><title>Domain User and Group Enumeration</title><link>https://leikah.haoyingcao.xyz/en/docs/active_directory/credentialed_enum/user_enum/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://leikah.haoyingcao.xyz/en/docs/active_directory/credentialed_enum/user_enum/</guid><description>&lt;p&gt;With the ability to authenticate to an Active Directory domain, we can now get a full list of users and groups on the domain. This can be helpful for us to plan further attacks and expand our access within the domain.&lt;/p&gt;
&lt;h2 id="domain-users"&gt;Domain Users&lt;a class="td-heading-self-link" href="#domain-users" aria-label="Heading self-link"&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;h3 id="linux-perspective"&gt;Linux Perspective&lt;a class="td-heading-self-link" href="#linux-perspective" aria-label="Heading self-link"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;p&gt;The &lt;code&gt;--users&lt;/code&gt; option may be used with &lt;strong&gt;NetExec&lt;/strong&gt; to enumerate domain users. Note we have to use protocol &lt;code&gt;ldap&lt;/code&gt; and our target must be a domain controller.&lt;/p&gt;</description></item><item><title>Domain Enumeration with Bloodhound CE</title><link>https://leikah.haoyingcao.xyz/en/docs/active_directory/credentialed_enum/bloodhound/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://leikah.haoyingcao.xyz/en/docs/active_directory/credentialed_enum/bloodhound/</guid><description>&lt;p&gt;BloodHound allows information about domain accounts and their relationships to be collected automatically and then analyzed and presented in a graph format. It is very powerful to discover hidden and often unintended access rights and privileges possessed by principals. It also give suggestions on how attackers may abuse those access to achieve lateral movement or privilege escalation.&lt;/p&gt;
&lt;p&gt;Please consult this &lt;a href="https://bloodhound.specterops.io/get-started/quickstart/community-edition-quickstart"&gt;quick start guide&lt;/a&gt; on how to install and set up the newest version of BloodHound Community Edition.&lt;/p&gt;</description></item></channel></rss>