2.1 KiB
2.1 KiB
Vulnerable Application
This module extracts user accounts from specified group and stores
the results in the loot. It will also verify if session account is
in the group. Data is stored in loot in a format that is compatible
with the token_hunter plugin. This module should be run over as
session with domain credentials.
This information is gathered through the net groups <domain> /domain command.
Verification Steps
- Start msfconsole
- Get a session on a Windows target which is joined to a domain
- Do:
use post/windows/gather/enum_domain_group_users - Do:
set session [#] - Do:
set group - Do:
run - You should get the domain members for the group.
Options
Group
The group to enumerate.
Scenarios
Windows 2012 DC
msf6 post(windows/gather/enum_domain_group_users) > use post/windows/gather/enum_domain_group_users
msf6 post(windows/gather/enum_domain_group_users) > sessions -i 6
[*] Starting interaction with 6...
meterpreter > sysinfo
Computer : DC1
OS : Windows 2012 (6.2 Build 9200).
Architecture : x64
System Language : en_US
Domain : hoodiecola
Logged On Users : 4
Meterpreter : x86/windows
meterpreter > background
[*] Backgrounding session 6...
msf6 post(windows/gather/enum_domain_group_users) > set session 6
session => 6
msf6 post(windows/gather/enum_domain_group_users) > set group finance
group => finance
msf6 post(windows/gather/enum_domain_group_users) > run
[*] Running module against DC1
[-] No members found for finance
[*] Post module execution completed
msf6 post(windows/gather/enum_domain_group_users) > set group "quality control"
group => quality control
msf6 post(windows/gather/enum_domain_group_users) > run
[*] Running module against DC1
[*] Found users in quality control
[*] hoodiecola\rachel
[*] hoodiecola\lisa
[*] hoodiecola\charles
[*] Current session running as NT AUTHORITY\SYSTEM is not a member of quality control
[+] User list stored in /root/.msf4/loot/20201011184812_default_1.1.1.1_domain.group.mem_339475.txt
[*] Post module execution completed