Domain Enumeration
Overview
Essential Domain Enumeration Tools
1. ldapdomaindump
Installation
# Install via pip
pip3 install ldapdomaindump
# Or install from source
git clone https://github.com/dirkjanm/ldapdomaindump.git
cd ldapdomaindump
python3 setup.py installBasic Usage
# Basic domain dump with credentials
ldapdomaindump -u 'DOMAIN\username' -p 'password' dc_ip
# Using NTLM hash
ldapdomaindump -u 'DOMAIN\username' --hashes :ntlm_hash dc_ip
# Specify output directory
ldapdomaindump -u 'DOMAIN\username' -p 'password' -o /tmp/ldap_dump dc_ip
# Use different authentication methods
ldapdomaindump -u 'username@domain.local' -p 'password' dc_ipAdvanced Options
Output Analysis
2. BloodHound
Installation
Data Collection with SharpHound
Data Collection with BloodHound.py
BloodHound Analysis
3. PlumHound
Installation
Usage with BloodHound Data
Custom Report Generation
4. PingCastle
Installation and Usage
Comprehensive Domain Enumeration Workflow
Phase 1: Initial LDAP Enumeration
Phase 2: BloodHound Data Collection
Phase 3: BloodHound Analysis
Phase 4: Extended Analysis with PlumHound
Advanced Enumeration Techniques
LDAP Queries with ldapsearch
PowerShell AD Enumeration (if on Windows)
Impacket Tools for Domain Enumeration
Key Information to Extract
User Accounts
Groups
Computers
Permissions and Rights
Attack Path Identification
Common Attack Paths
BloodHound Queries for Attack Paths
Defensive Considerations
Detection Indicators
Mitigation Strategies
Reporting and Documentation
Key Findings to Document
Evidence Collection
Tools Comparison
Tool
Purpose
Output Format
Best For
Last updated