Users Identification

Guest and null session
SMB (445, 139) / RPCNull Session
Find user list, then try ASREPROAST, no credentials needed - getNPUsers.py
Guest session
Wordlist
jsmith.txt and a lot of usefull username list like service-accounts.txt test-accounts or top-formats.txt
From Linkedin
Social MediaMS-NRPC
Enumerate Domain Users Without Authentication
LDAP
Nom Nom
Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)
Anon
Description field
Find user list, then try ASREPROAST, no credentials needed - getNPUsers.py
NXC

Kerbrute
Precompiled release:
kerbrute doesn't always find asreproastable accounts. Always try getNPusers.py to find asreproastable accounts (doesn't require credentials, just a list of users).

LLMNR NBT-NS Poisoning
LLMNR NBT-NS PoisoningAuthent
Windows
Or With GUI: Properties -> Security -> Advanced -> Effective Access -> Select a User -> Advanced -> Object Types then "Find Now"

Columns to Add Descriptions

ADrecon
NXC

Enumerate all user sessions on a host with normal User privileges
As long as the remote registry is running

Last updated