Common domain information collection command -AD (2)

Domain related commands

Adding to the domain users:
NET username passwd the User / the Add / Domain
disable / enable users:
NET username passwd the User / the Active: NO [| yes] / Domain
delete users:
NET the User passwd username / del / Domain

A user query domain
dsquery user
Example 1: Query the art all users:
dsquery user domainroot
NET User / Domain
Example 2: Query art at the beginning of the 10 users admin
dsquery user domainroot -name admin * -limit 10
Example 3: A user query domain login time
net user username / domain

Query within computer:
dsquery Computer
Example 1: Query domain name all machines:
dsquery -limit Computer domainroot 0
NET Group "Domain Computers" / Domain
2 Example: query domain name as "admin" at the beginning of the 10 machines
dsquery computer domainroot -name admin * -limit 10

Query domain contacts
dsquery contact
Example: query domain admin to 10 contacts at the beginning of
dsquery contact domainroot -name admin * -limit 10

Network segmentation query domain
dsquery subnet

Discover all packets within
dsquery Group
NET Group / Domain

Queries all domain controllers
dsquery Server
NET Group "Domain the Controllers" / Domain
Example: query all domain controllers super.com domain and display their DNS host name and the domain name
dsquery Server -domain super.com | dsget Server -dnsname -site
/ *
Find domain controller workaround:
NET time
this command returns the domain name and domain control control current time
* /

Queries the domain administrator user
net group "Domain Admins" / domain

Query field list
net view / domain

Query the current activities within the machine
net view

Other fields of activity query machine
net view / domain: DCname


Permeation art
1, to crack the code fetch hash (gsecdump, wce, pwdump7, gethash etc.)
2, hash injection (WCE -s)
. 3, the read plaintext password lsa (wce1.3 -w, gsecdump -a)
4,0day overflow (smb, rdp, dns, rpc, etc.)
5, an administrator account password recording mounting gina
6, hd scan weak passwords, etc.


----------------
Disclaimer: This article is CSDN blogger "changetjut 'original article, follow the CC 4.0 BY-SA copyright agreement, reproduced, please attach the original source link and this statement. .
Original link: https: //blog.csdn.net/change518/article/details/7963222

Guess you like

Origin www.cnblogs.com/hoiart/p/11432714.html