Files
metasploit-gs/documentation/modules/post/windows/gather/enum_domain.md
T

46 lines
1.1 KiB
Markdown

## Vulnerable Application
This module identifies the primary Active Directory domain name
and domain controller.
## Verification Steps
1. Start msfconsole
1. Get a session on a Windows target on a domain
1. Do: `use post/windows/gather/enum_domain`
1. Do: `set session [#]`
1. Do: `run`
1. You should receive Active Directory domain information
## Options
## Scenarios
### Windows 2016 with Windows 2008 SP1 DC
```
msf6 post(windows/gather/enum_domain) > sessions -i 1
[*] Starting interaction with 1...
meterpreter > sysinfo
Computer : WIN-7V3NGVNQTJ1
OS : Windows 2016+ (10.0 Build 14393).
Architecture : x64
System Language : en_US
Domain : CORP
Logged On Users : 4
Meterpreter : x64/windows
meterpreter > background
[*] Backgrounding session 1...
msf6 post(windows/gather/enum_domain) > use post/windows/gather/enum_domain
msf6 post(windows/gather/enum_domain) > set session 1
session => 1
msf6 post(windows/gather/enum_domain) > run
[+] Domain FQDN: corp.local
[+] Domain NetBIOS Name: CORP
[+] Domain Controller: WIN-17B09RRRJTG.corp.local (IP: 192.168.200.218)
[*] Post module execution completed
```