all InfoSec news
User Enumeration Techniques and Tactics In an Active Directory Pentesting Engagement.
March 15, 2024, 12:52 p.m. | Hashar Mujahid
InfoSec Write-ups - Medium infosecwriteups.com
Hi! My name is Hashar Mujahid and Today we will learn some techniques and ways by which we can enumerate valid users in an Active Directory Environment.
There are quite a few ways by which we might be able to extract a list of valid usernames, Let's discuss them one by one.
SMB USERNAME ENUMERATION:
Misconfigured SMB shares can give us a lot of information about our target and environment.
We can use a --users fag in crackmapexec to discover …
active directory cybersecurity ethical hacking penetration testing pentesting
More from infosecwriteups.com / InfoSec Write-ups - Medium
Hack Stories: Hacking Hackers EP:3
3 days, 5 hours ago |
infosecwriteups.com
Mastering Shodan Search Engine
4 days, 6 hours ago |
infosecwriteups.com
Email Verification Bypass via Remember Me
4 days, 6 hours ago |
infosecwriteups.com
Active DNS Recon using AXIOM
4 days, 6 hours ago |
infosecwriteups.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Open-Source Intelligence (OSINT) Policy Analyst (TS/SCI)
@ WWC Global | Reston, Virginia, United States
Security Architect (DevSecOps)
@ EUROPEAN DYNAMICS | Brussels, Brussels, Belgium
Infrastructure Security Architect
@ Ørsted | Kuala Lumpur, MY
Contract Penetration Tester
@ Evolve Security | United States - Remote
Senior Penetration Tester
@ DigitalOcean | Canada