March 15, 2024, 12:52 p.m. | Hashar Mujahid

InfoSec Write-ups - Medium infosecwriteups.com

Hi! My name is Hashar Mujahid and Today we will learn some techniques and ways by which we can enumerate valid users in an Active Directory Environment.

There are quite a few ways by which we might be able to extract a list of valid usernames, Let's discuss them one by one.

SMB USERNAME ENUMERATION:

Misconfigured SMB shares can give us a lot of information about our target and environment.

We can use a --users fag in crackmapexec to discover …

active directory cybersecurity ethical hacking penetration testing pentesting

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Open-Source Intelligence (OSINT) Policy Analyst (TS/SCI)

@ WWC Global | Reston, Virginia, United States

Security Architect (DevSecOps)

@ EUROPEAN DYNAMICS | Brussels, Brussels, Belgium

Infrastructure Security Architect

@ Ørsted | Kuala Lumpur, MY

Contract Penetration Tester

@ Evolve Security | United States - Remote

Senior Penetration Tester

@ DigitalOcean | Canada