External Enumeration
External enumeration involves gathering information about Windows systems from outside the network. Techniques like SMB probing, Nmap scanning, and DNS zone transfers help identify active hosts, exposed services, and potential vulnerabilities before gaining internal access.
Network Discovery
Identify live hosts and gather basic network information to map out the target environment.
Nmap
Enumerating hosts using ping scan.
nmap -sn <TARGET_SUBNET>
Zone Transfer
Zone transfers can reveal detailed DNS information, including records for hosts within the domain.
dig axfr <domain_name>@<name_server>
Smb
Enumerating smb
hosts:
nxc smb <target_subnet>

Service and Port Scanning
Enumerate open ports and running services to identify potential entry points.
Nmap
Scanning specific hosts:
nmap -Pn -p- -sC -sV -oN <output_file> <target>
-Pn
donβt do ping scan-p-
scan the 65535 ports instead of the defaultnmap
1000 top ports-sC
run default script for reconnaissance-sV
enumerate the version-oN
write results in normal format
RPC
Checking for Null Sessions:
rpcclient -U "" <target>
Active Directory Reconnaissance
Gather detailed information about Active Directory environments, including users, groups, and policies.
Find DCs
nslookup -type=srv _kerberos._tcp.dc._msdcs.<domain> <target_ip>

Enum4linux
enum4linux -U <target>
RPC
Connect anonymously
rpcclient -U "<domain_name>\\" <target> -N
Enumerate users:
rpcclient $> enumdomusers
SMB
nxc smb <target> -u '' -p '' --shares
nxc smb <target> -u 'a' -p '' --shares
nxc smb <target> -u 'guest' -p '' --shares
Enumerate valid users:
nxc smb <target> -u '' -p '' -
nxc smb <target> -u 'a' -p ''
nxc smb <target> -u 'guest' -p ''
# Enumerate users
nxc smb <target> -u '' -p '' --users
# Perform RID Bruteforce to get users
nxc smb <target> -u '' -p '' --rid-brute
# Enumerate domain groups
nxc smb <target> -u '' -p '' --groups
# Enumerate available shares
nxc smb <target> -u '' -p '' --shares
smbclient -L //<target> -N
# Get the active sessions
nxc smb <target> -u '' -p '' --sessions
# Get the password policy
nxc smb <target> -u '' -p '' --pass-pol
Users Enumeration
NXC
nxc smb <target> -u <userlist_file> -p <pass> --continue-on-success
Kerbrute
kerbrute userenum <userlist_file> -d <domain_name> --dc <dc_ip>
References
Last updated