March 15, 2024, 12:52 p.m. | Hashar Mujahid

InfoSec Write-ups - Medium infosecwriteups.com

Hi! My name is Hashar Mujahid and Today we will learn some techniques and ways by which we can enumerate valid users in an Active Directory Environment.

There are quite a few ways by which we might be able to extract a list of valid usernames, Let's discuss them one by one.

SMB USERNAME ENUMERATION:

Misconfigured SMB shares can give us a lot of information about our target and environment.

We can use a --users fag in crackmapexec to discover …

active directory cybersecurity ethical hacking penetration testing pentesting

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States