Windows Enumeration
Overview
Windows service enumeration targets the protocols and management interfaces specific to Windows and Active Directory environments. These services frequently expose usernames, group memberships, password policies, share structures, and domain topology — often with null sessions or minimal credentials.
Topics in This Section
- Kerberos Enumeration — User validation, AS-REP Roasting, Kerberoasting, SPNs
- LDAP Enumeration — AD directory queries, user/group extraction, SPNs, delegation
- MSRPC Enumeration — Endpoint mapping, rpcclient, SAMR user enumeration
- RDP Enumeration — NLA detection, NTLM info, credential testing, xfreerdp3
- SMB Enumeration — Shares, users, enum4linux-ng, smbmap, NetExec, RID cycling, NetBIOS
- WinRM Enumeration — Service detection, Evil-WinRM, remote management access
General Approach
- Start with SMB and LDAP — they expose the most data with the least credentials
- Test null sessions and guest access — SMB null sessions, LDAP anonymous bind, RPC null sessions
- Enumerate users via multiple paths — SMB RID cycling, LDAP queries, SAMR, NTLM info leaks
- Map the domain — LDAP gives you the full AD structure, GPOs, trusts, and delegation
- Check every protocol for NTLM info — SMB, RDP, RPC all leak domain names and hostnames
- Test discovered credentials across all services — a password from SMB may grant WinRM or RDP access