Files
metasploit-gs/documentation/modules/post/windows/gather/enum_domain.md
T
2020-10-11 18:53:28 -04:00

1.1 KiB

Vulnerable Application

This module identifies the primary domain via the registry. The registry value used is: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy\History\DCName.

Verification Steps

  1. Start msfconsole
  2. Get a session on a Windows target on a domain
  3. Do: use post/windows/gather/enum_domain
  4. Do: set session [#]
  5. Do: run
  6. You should information on the computer's domain

Options

Scenarios

Windows 2012 DC

msf6 post(windows/gather/enum_domain) > sessions -i 6
[*] Starting interaction with 6...

meterpreter > sysinfo
Computer        : DC1
OS              : Windows 2012 (6.2 Build 9200).
Architecture    : x64
System Language : en_US
Domain          : hoodiecola
Logged On Users : 4
Meterpreter     : x86/windows
meterpreter > background
[*] Backgrounding session 6...
msf6 post(windows/gather/enum_domain) > use post/windows/gather/enum_domain
msf6 post(windows/gather/enum_domain) > set session 6
session => 6
msf6 post(windows/gather/enum_domain) > run

[+] FOUND Domain: hoodiecola
[+] FOUND Domain Controller: dc1 (IP: 1.1.1.1)
[*] Post module execution completed