Users Identification

ko-fiarrow-up-right

Guest and null session

SMB (445, 139) / RPCchevron-right

Null Session

triangle-exclamation

Guest session

Wordlist

jsmith.txt and a lot of usefull username list like service-accounts.txt test-accounts or top-formats.txt

Username listschevron-right

From Linkedin

Social Mediachevron-right

MS-NRPC

Enumerate Domain Users Without Authentication

LDAP

Nom Nom

Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)

Anon

Description field

triangle-exclamation

NXC

Kerbrute

Precompiled release:

triangle-exclamation
Misconfigurationchevron-right

LLMNR NBT-NS Poisoning

LLMNR NBT-NS Poisoningchevron-right

Authent

Windows

Or With GUI: Properties -> Security -> Advanced -> Effective Access -> Select a User -> Advanced -> Object Types then "Find Now"

Columns to Add Descriptions

ADrecon

NXC

Enumerate all user sessions on a host with normal User privileges

As long as the remote registry is running

Last updated