Files
atomic-red-team/Windows/Discovery/Account_Discovery.md
T
Matthew Green cfa399357b small change
2017-10-13 23:26:09 +11:00

1.1 KiB
Raw Blame History

Account Discovery

MITRE ATT&CK Technique: T1087

Test Script

Discovery

Net.exe

Domain Group Enumeration:

net group "domain admins" /domain

Domain User Enumeration:

net user <username> /domain

Local Group Enumeration:

net localgroup "administrators"

Local User Enumeration:

net user

Input:

net use

Input:

net share

Input:

net view

Input:

net accounts

wmic.exe

Reconnaissance

Input:

wmic useraccount get /ALL

Input:

wmic useraccount list

Input:

wmic startup list brief

Input:

wmic share list

Input:

wmic service get name,displayname,pathname,startmode

Input:

wmic process list brief

Input:

wmic process get caption,executablepath,commandline

Input:

wmic qfe get description,installedOn /format:csv

Input:

wmic /node:"192.168.0.1" service where (caption like "%sql server (%")

Input:

get-wmiobject class "win32_share" namespace "root\CIMV2" computer "targetname"