46 lines
1.1 KiB
Markdown
46 lines
1.1 KiB
Markdown
## Vulnerable Application
|
|
|
|
This module identifies the primary Active Directory domain name
|
|
and domain controller.
|
|
|
|
## Verification Steps
|
|
|
|
1. Start msfconsole
|
|
1. Get a session on a Windows target on a domain
|
|
1. Do: `use post/windows/gather/enum_domain`
|
|
1. Do: `set session [#]`
|
|
1. Do: `run`
|
|
1. You should receive Active Directory domain information
|
|
|
|
## Options
|
|
|
|
## Scenarios
|
|
|
|
### Windows 2016 with Windows 2008 SP1 DC
|
|
|
|
```
|
|
msf6 post(windows/gather/enum_domain) > sessions -i 1
|
|
[*] Starting interaction with 1...
|
|
|
|
meterpreter > sysinfo
|
|
Computer : WIN-7V3NGVNQTJ1
|
|
OS : Windows 2016+ (10.0 Build 14393).
|
|
Architecture : x64
|
|
System Language : en_US
|
|
Domain : CORP
|
|
Logged On Users : 4
|
|
Meterpreter : x64/windows
|
|
meterpreter > background
|
|
[*] Backgrounding session 1...
|
|
|
|
msf6 post(windows/gather/enum_domain) > use post/windows/gather/enum_domain
|
|
msf6 post(windows/gather/enum_domain) > set session 1
|
|
session => 1
|
|
msf6 post(windows/gather/enum_domain) > run
|
|
|
|
[+] Domain FQDN: corp.local
|
|
[+] Domain NetBIOS Name: CORP
|
|
[+] Domain Controller: WIN-17B09RRRJTG.corp.local (IP: 192.168.200.218)
|
|
[*] Post module execution completed
|
|
```
|