{"id":18269,"date":"2021-09-11T06:00:00","date_gmt":"2021-09-11T06:00:00","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=18269"},"modified":"2021-09-11T05:26:02","modified_gmt":"2021-09-11T05:26:02","slug":"edd","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/edd\/","title":{"rendered":"EDD : Enumerate Domain Data"},"content":{"rendered":"\n<p><strong>EDD<\/strong> (Enumerate Domain Data) is designed to be similar to Power View but in .NET. Power View is essentially the ultimate domain enumeration tool, and we wanted a .NET implementation that we worked on ourselves. This tool was largely put together by viewing implementations of different functionality across a wide range of existing projects and combining them into EDD.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Usage<\/strong><\/p>\n\n\n\n<p>To use EDD, you just need to call the application, provide the function that you want to run (listed below) and provide any optional\/required parameters used by the function.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-xmuvq-e-A2M\/YTtdTK_9Y3I\/AAAAAAAAKy0\/29T8OLipd7sKwZt_LrCTagTB015kS4NOQCLcBGAsYHQ\/s602\/1.png\" alt=\"\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Functions<\/strong><\/p>\n\n\n\n<p>The following functions can be used with the -f flag to specify the data you want to enumerate\/action you want to take.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/FortyNorthSecurity\/EDD#forestdomain-information\"><\/a><strong>Forest\/Domain Information<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>getdomainsid &#8211; Returns the domain sid (by default current domain if no domain is provided)<br>getforest &#8211; returns the name of the current forest<br>getforestdomains &#8211; returns the name of all domains in the current forest<br>convertsidtoname &#8211; Converts a SID to the corresponding group or domain name (use the -u option for providing the SID value)<br>getadcsservers &#8211; Get a list of servers running AD CS within the current domain<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Computer Information<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>getdomaincomputers &#8211; Get a list of all computers in the domain<br>getdomaincontrollers &#8211; Gets a list of all domain controllers<br>getdomainshares &#8211; Get a list of all accessible domain shares<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>User Information<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>getnetlocalgroupmember &#8211; Returns a list of all users in a local group on a remote system<br>getnetdomaingroupmember &#8211; Returns a list of all users in a domain group<br>getdomainuser &#8211; Retrieves info about specific user (name, description, SID, Domain Groups)<br>getnetsession &#8211; Returns a list of accounts with sessions on the targeted system<br>getnetloggedon &#8211; Returns a list of accounts logged into the targeted system<br>getuserswithspns &#8211; Returns a list of all domain accounts that have a SPN associated with them<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Chained Information<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>finddomainprocess &#8211; Search for a specific process across all systems in the domain (requires admin access on remote systems)<br>finddomainuser &#8211; Searches the domain environment for a specified user or group and tries to find active sessions (default searches for Domain Admins)<br>findinterestingdomainsharefile &#8211; Searches the domain environment for all accessible shares. Once found, it parses all filenames for &#8220;interesting&#8221; strings<br>findwritableshares &#8211; Enumerates all shares in the domain and then checks to see if the current account can create a text file in the root level share, and one level deep.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/FortyNorthSecurity\/EDD\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>EDD (Enumerate Domain Data) is designed to be similar to Power View but in .NET. Power View is essentially the ultimate domain enumeration tool, and we wanted a .NET implementation that we worked on ourselves. This tool was largely put together by viewing implementations of different functionality across a wide range of existing projects and [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":18284,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-WLI9nf9owxk\/YTtfjD9k61I\/AAAAAAAAKy8\/rZ5ZmCVuZ7k6cIwYqP2J5eISoVrtJij7gCLcBGAsYHQ\/s760\/download.png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[4157,4158],"class_list":["post-18269","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-edd","tag-enumerate-domain-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>EDD : Enumerate Domain Data !!! Kali Linux Tutorials<\/title>\n<meta name=\"description\" content=\"EDD is designed to be similar to Power View but in .NET. Power View is essentially the ultimate domain enumeration tool.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/edd\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EDD : Enumerate Domain Data !!! Kali Linux Tutorials\" \/>\n<meta property=\"og:description\" content=\"EDD is designed to be similar to Power View but in .NET. Power View is essentially the ultimate domain enumeration tool.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/edd\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-11T06:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-WLI9nf9owxk\/YTtfjD9k61I\/AAAAAAAAKy8\/rZ5ZmCVuZ7k6cIwYqP2J5eISoVrtJij7gCLcBGAsYHQ\/s760\/download.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-WLI9nf9owxk\/YTtfjD9k61I\/AAAAAAAAKy8\/rZ5ZmCVuZ7k6cIwYqP2J5eISoVrtJij7gCLcBGAsYHQ\/s760\/download.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/edd\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/edd\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"EDD : Enumerate Domain Data\",\"datePublished\":\"2021-09-11T06:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/edd\/\"},\"wordCount\":393,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/edd\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-WLI9nf9owxk\/YTtfjD9k61I\/AAAAAAAAKy8\/rZ5ZmCVuZ7k6cIwYqP2J5eISoVrtJij7gCLcBGAsYHQ\/s760\/download.png\",\"keywords\":[\"EDD\",\"Enumerate Domain Data\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/edd\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/edd\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/edd\/\",\"name\":\"EDD : Enumerate Domain Data !!! Kali Linux Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/edd\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/edd\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-WLI9nf9owxk\/YTtfjD9k61I\/AAAAAAAAKy8\/rZ5ZmCVuZ7k6cIwYqP2J5eISoVrtJij7gCLcBGAsYHQ\/s760\/download.png\",\"datePublished\":\"2021-09-11T06:00:00+00:00\",\"description\":\"EDD is designed to be similar to Power View but in .NET. Power View is essentially the ultimate domain enumeration tool.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/edd\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/edd\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-WLI9nf9owxk\/YTtfjD9k61I\/AAAAAAAAKy8\/rZ5ZmCVuZ7k6cIwYqP2J5eISoVrtJij7gCLcBGAsYHQ\/s760\/download.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-WLI9nf9owxk\/YTtfjD9k61I\/AAAAAAAAKy8\/rZ5ZmCVuZ7k6cIwYqP2J5eISoVrtJij7gCLcBGAsYHQ\/s760\/download.png\",\"width\":\"760\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EDD : Enumerate Domain Data !!! Kali Linux Tutorials","description":"EDD is designed to be similar to Power View but in .NET. Power View is essentially the ultimate domain enumeration tool.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/edd\/","og_locale":"en_US","og_type":"article","og_title":"EDD : Enumerate Domain Data !!! Kali Linux Tutorials","og_description":"EDD is designed to be similar to Power View but in .NET. Power View is essentially the ultimate domain enumeration tool.","og_url":"https:\/\/kalilinuxtutorials.com\/edd\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-09-11T06:00:00+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-WLI9nf9owxk\/YTtfjD9k61I\/AAAAAAAAKy8\/rZ5ZmCVuZ7k6cIwYqP2J5eISoVrtJij7gCLcBGAsYHQ\/s760\/download.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-WLI9nf9owxk\/YTtfjD9k61I\/AAAAAAAAKy8\/rZ5ZmCVuZ7k6cIwYqP2J5eISoVrtJij7gCLcBGAsYHQ\/s760\/download.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/edd\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/edd\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"EDD : Enumerate Domain Data","datePublished":"2021-09-11T06:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/edd\/"},"wordCount":393,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/edd\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-WLI9nf9owxk\/YTtfjD9k61I\/AAAAAAAAKy8\/rZ5ZmCVuZ7k6cIwYqP2J5eISoVrtJij7gCLcBGAsYHQ\/s760\/download.png","keywords":["EDD","Enumerate Domain Data"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/edd\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/edd\/","url":"https:\/\/kalilinuxtutorials.com\/edd\/","name":"EDD : Enumerate Domain Data !!! Kali Linux Tutorials","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/edd\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/edd\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-WLI9nf9owxk\/YTtfjD9k61I\/AAAAAAAAKy8\/rZ5ZmCVuZ7k6cIwYqP2J5eISoVrtJij7gCLcBGAsYHQ\/s760\/download.png","datePublished":"2021-09-11T06:00:00+00:00","description":"EDD is designed to be similar to Power View but in .NET. Power View is essentially the ultimate domain enumeration tool.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/edd\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/edd\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-WLI9nf9owxk\/YTtfjD9k61I\/AAAAAAAAKy8\/rZ5ZmCVuZ7k6cIwYqP2J5eISoVrtJij7gCLcBGAsYHQ\/s760\/download.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-WLI9nf9owxk\/YTtfjD9k61I\/AAAAAAAAKy8\/rZ5ZmCVuZ7k6cIwYqP2J5eISoVrtJij7gCLcBGAsYHQ\/s760\/download.png","width":"760","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-WLI9nf9owxk\/YTtfjD9k61I\/AAAAAAAAKy8\/rZ5ZmCVuZ7k6cIwYqP2J5eISoVrtJij7gCLcBGAsYHQ\/s760\/download.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":8031,"url":"https:\/\/kalilinuxtutorials.com\/turbolist3r-subdomain-enumeration-tool\/","url_meta":{"origin":18269,"position":0},"title":"Turbolist3r : Subdomain Enumeration Tool With Analysis Features For Discovered Domains","author":"R K","date":"January 5, 2020","format":false,"excerpt":"Turbolist3r is a fork of the sublist3r subdomain discovery tool. In addition to the original OSINT capabilties of sublist3r, turbolist3r automates some analysis of the results, with a focus on subdomain takeover. Turbolist3r queries public DNS servers for each discovered subdomain. If the subdomain exists (i.e. the resolver replied with\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11919,"url":"https:\/\/kalilinuxtutorials.com\/adsearch\/","url_meta":{"origin":18269,"position":1},"title":"ADSearch : A Tool To Help Query AD Via The LDAP Protocol","author":"R K","date":"December 10, 2020","format":false,"excerpt":"ADSearch is a tool written for cobalt-strike's execute-assembly command that allows for more efficent querying of AD. Key Features List all Domain AdminsCustom LDAP SearchConnect to LDAPS ServersOutput JSON data from AD instancesRetrieve custom attributes from a generic query (i.e. All computers) Usage ADSearch 1.0.0.0Copyright c 2020USAGE:Query Active Directory remotely\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":32049,"url":"https:\/\/kalilinuxtutorials.com\/sharpadws\/","url_meta":{"origin":18269,"position":2},"title":"SharpADWS &#8211; Red Team&#8217;s Secret Weapon For Active Directory Reconnaissance","author":"Varshini","date":"February 14, 2024","format":false,"excerpt":"A groundbreaking tool revolutionizing Active Directory reconnaissance for Red Teams. By leveraging the obscure Active Directory Web Services (ADWS) protocol, SharpADWS enables discreet data collection and manipulation, evading traditional detection methods. Explore its unique advantages and protocol implementation, empowering Red Teams with unparalleled precision in post-exploitation operations. Active Directory reconnaissance\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgc6nTMY_p1DRPuoicIf5URDgzR3Mgsc8uyvYoVHaekW_ZGmgbYOMUTemsY-sctaDI8A8jOkFUySemUNnf0PcxHVN9TVwcbpfJCn9Ps4pVdVyRAkyal8H2vylhz4CS3SP4MpDdvFlfkhiX0Za0ruuhtQDn-7QbJX7ABYS6tIUwOO8dE985MMkohaJ4nBYjV\/s16000\/Untitled%20design%20%2819%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgc6nTMY_p1DRPuoicIf5URDgzR3Mgsc8uyvYoVHaekW_ZGmgbYOMUTemsY-sctaDI8A8jOkFUySemUNnf0PcxHVN9TVwcbpfJCn9Ps4pVdVyRAkyal8H2vylhz4CS3SP4MpDdvFlfkhiX0Za0ruuhtQDn-7QbJX7ABYS6tIUwOO8dE985MMkohaJ4nBYjV\/s16000\/Untitled%20design%20%2819%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgc6nTMY_p1DRPuoicIf5URDgzR3Mgsc8uyvYoVHaekW_ZGmgbYOMUTemsY-sctaDI8A8jOkFUySemUNnf0PcxHVN9TVwcbpfJCn9Ps4pVdVyRAkyal8H2vylhz4CS3SP4MpDdvFlfkhiX0Za0ruuhtQDn-7QbJX7ABYS6tIUwOO8dE985MMkohaJ4nBYjV\/s16000\/Untitled%20design%20%2819%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgc6nTMY_p1DRPuoicIf5URDgzR3Mgsc8uyvYoVHaekW_ZGmgbYOMUTemsY-sctaDI8A8jOkFUySemUNnf0PcxHVN9TVwcbpfJCn9Ps4pVdVyRAkyal8H2vylhz4CS3SP4MpDdvFlfkhiX0Za0ruuhtQDn-7QbJX7ABYS6tIUwOO8dE985MMkohaJ4nBYjV\/s16000\/Untitled%20design%20%2819%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgc6nTMY_p1DRPuoicIf5URDgzR3Mgsc8uyvYoVHaekW_ZGmgbYOMUTemsY-sctaDI8A8jOkFUySemUNnf0PcxHVN9TVwcbpfJCn9Ps4pVdVyRAkyal8H2vylhz4CS3SP4MpDdvFlfkhiX0Za0ruuhtQDn-7QbJX7ABYS6tIUwOO8dE985MMkohaJ4nBYjV\/s16000\/Untitled%20design%20%2819%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgc6nTMY_p1DRPuoicIf5URDgzR3Mgsc8uyvYoVHaekW_ZGmgbYOMUTemsY-sctaDI8A8jOkFUySemUNnf0PcxHVN9TVwcbpfJCn9Ps4pVdVyRAkyal8H2vylhz4CS3SP4MpDdvFlfkhiX0Za0ruuhtQDn-7QbJX7ABYS6tIUwOO8dE985MMkohaJ4nBYjV\/s16000\/Untitled%20design%20%2819%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":29971,"url":"https:\/\/kalilinuxtutorials.com\/adcskiller\/","url_meta":{"origin":18269,"position":3},"title":"ADCSKiller &#8211; An ADCS Exploitation Automation Tool","author":"Varshini","date":"September 4, 2023","format":false,"excerpt":"ADCSKiller is a Python-based tool designed to automate the process of discovering and exploiting Active Directory Certificate Services (ADCS) vulnerabilities. It leverages the features of Certipy and Coercer to simplify the process of attacking ADCS infrastructure. Please note that the ADCSKiller is currently in its first draft and will undergo\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi5SbFtT_UEIYRb7MB6E7WfcS-nZLP71KE7Gol-2BkqZx4cb3KXwCSsk9xBO9cJXmI_w_KYF9mgFTGSfQ-sG9DnWrr8mmql0TDtUD6eEJvqmGVJejC0320pTc8-TxNqXa3s_pRWcO83DJEV6SwHYc_UQjYbxdohSAaGqB7uq3exaYrijJhk3NEyDcsyYJno\/s16000\/OWASP%20WrongSecrets%20-%20Multi-Tenant%20CTF%20Party%20Setup%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi5SbFtT_UEIYRb7MB6E7WfcS-nZLP71KE7Gol-2BkqZx4cb3KXwCSsk9xBO9cJXmI_w_KYF9mgFTGSfQ-sG9DnWrr8mmql0TDtUD6eEJvqmGVJejC0320pTc8-TxNqXa3s_pRWcO83DJEV6SwHYc_UQjYbxdohSAaGqB7uq3exaYrijJhk3NEyDcsyYJno\/s16000\/OWASP%20WrongSecrets%20-%20Multi-Tenant%20CTF%20Party%20Setup%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi5SbFtT_UEIYRb7MB6E7WfcS-nZLP71KE7Gol-2BkqZx4cb3KXwCSsk9xBO9cJXmI_w_KYF9mgFTGSfQ-sG9DnWrr8mmql0TDtUD6eEJvqmGVJejC0320pTc8-TxNqXa3s_pRWcO83DJEV6SwHYc_UQjYbxdohSAaGqB7uq3exaYrijJhk3NEyDcsyYJno\/s16000\/OWASP%20WrongSecrets%20-%20Multi-Tenant%20CTF%20Party%20Setup%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi5SbFtT_UEIYRb7MB6E7WfcS-nZLP71KE7Gol-2BkqZx4cb3KXwCSsk9xBO9cJXmI_w_KYF9mgFTGSfQ-sG9DnWrr8mmql0TDtUD6eEJvqmGVJejC0320pTc8-TxNqXa3s_pRWcO83DJEV6SwHYc_UQjYbxdohSAaGqB7uq3exaYrijJhk3NEyDcsyYJno\/s16000\/OWASP%20WrongSecrets%20-%20Multi-Tenant%20CTF%20Party%20Setup%20%281%29.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":3568,"url":"https:\/\/kalilinuxtutorials.com\/knock-enumerate-subdomains\/","url_meta":{"origin":18269,"position":4},"title":"Knock  &#8211; Tool Designed To Enumerate Subdomains","author":"R K","date":"January 17, 2019","format":false,"excerpt":"Knock is a python tool designed to enumerate subdomains on a target domain through a wordlist. It is designed to scan for DNS zone transfer and to try to bypass the wildcard DNS record automatically if it is enabled. Now knockpy supports queries to VirusTotal subdomains, you can setting the\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":31942,"url":"https:\/\/kalilinuxtutorials.com\/active-directory-exploitation-cheat-sheet\/","url_meta":{"origin":18269,"position":5},"title":"Active Directory Exploitation Cheat Sheet &#8211; A Comprehensive Guide To Enumeration And Attack Methods","author":"Varshini","date":"February 5, 2024","format":false,"excerpt":"This cheat sheet contains common enumeration and attack methods for Windows Active Directory. This cheat sheet is inspired by the\u00a0PayloadAllTheThings\u00a0repo. Summary Active Directory Exploitation Cheat Sheet Summary Tools Domain Enumeration Using PowerView Using AD Module Using BloodHound Remote BloodHound On Site BloodHound Using Adalanche Remote adalanche Useful Enumeration Tools Local\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgv0m-tUPRsyQfIwOsOCIcvRmgxTSTJiqE-wZenrFIR0_f1IN28lwFoJghBUaKBZQ8IJJq2HiTlGiqE2XDqKSiDBqZMGetoTi0yOMNZip57fk2bhrwKHSdaBGowOjmPxL6REQJP1Qefa-Nc4hJze849_cQ3StkhFxvov6qixn_G1KQq9JnjNQm_x0ZYG7gR\/s16000\/Untitled%20design%20%2817%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgv0m-tUPRsyQfIwOsOCIcvRmgxTSTJiqE-wZenrFIR0_f1IN28lwFoJghBUaKBZQ8IJJq2HiTlGiqE2XDqKSiDBqZMGetoTi0yOMNZip57fk2bhrwKHSdaBGowOjmPxL6REQJP1Qefa-Nc4hJze849_cQ3StkhFxvov6qixn_G1KQq9JnjNQm_x0ZYG7gR\/s16000\/Untitled%20design%20%2817%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgv0m-tUPRsyQfIwOsOCIcvRmgxTSTJiqE-wZenrFIR0_f1IN28lwFoJghBUaKBZQ8IJJq2HiTlGiqE2XDqKSiDBqZMGetoTi0yOMNZip57fk2bhrwKHSdaBGowOjmPxL6REQJP1Qefa-Nc4hJze849_cQ3StkhFxvov6qixn_G1KQq9JnjNQm_x0ZYG7gR\/s16000\/Untitled%20design%20%2817%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgv0m-tUPRsyQfIwOsOCIcvRmgxTSTJiqE-wZenrFIR0_f1IN28lwFoJghBUaKBZQ8IJJq2HiTlGiqE2XDqKSiDBqZMGetoTi0yOMNZip57fk2bhrwKHSdaBGowOjmPxL6REQJP1Qefa-Nc4hJze849_cQ3StkhFxvov6qixn_G1KQq9JnjNQm_x0ZYG7gR\/s16000\/Untitled%20design%20%2817%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgv0m-tUPRsyQfIwOsOCIcvRmgxTSTJiqE-wZenrFIR0_f1IN28lwFoJghBUaKBZQ8IJJq2HiTlGiqE2XDqKSiDBqZMGetoTi0yOMNZip57fk2bhrwKHSdaBGowOjmPxL6REQJP1Qefa-Nc4hJze849_cQ3StkhFxvov6qixn_G1KQq9JnjNQm_x0ZYG7gR\/s16000\/Untitled%20design%20%2817%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgv0m-tUPRsyQfIwOsOCIcvRmgxTSTJiqE-wZenrFIR0_f1IN28lwFoJghBUaKBZQ8IJJq2HiTlGiqE2XDqKSiDBqZMGetoTi0yOMNZip57fk2bhrwKHSdaBGowOjmPxL6REQJP1Qefa-Nc4hJze849_cQ3StkhFxvov6qixn_G1KQq9JnjNQm_x0ZYG7gR\/s16000\/Untitled%20design%20%2817%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/18269","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=18269"}],"version-history":[{"count":14,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/18269\/revisions"}],"predecessor-version":[{"id":18283,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/18269\/revisions\/18283"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/18284"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=18269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=18269"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=18269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}