Copy PS C:\> Get-ADUser -Filter {ServicePrincipalName -ne "$null"} -Properties ServicePrincipalName
Copy net user /domain # List all users of the domain
net user <ACCOUNT_NAME> /domain # Get information about a user within the domain
net user %username% # Information about the current user
Copy PS C:\> Get-DomainUser -Identity sol -Domain militech.local | Select-Object -Property name,samaccountname,description,memberof,whencreated,pwdlastset,lastlogontimestamp,accountexpires,admincount,userprincipalname,serviceprincipalname,useraccountcontrol
Copy PS C:\> Test-AdminAccess -ComputerName MILITECH-MS13
Copy PS C:\> Get-DomainUser -SPN -Properties samaccountname,ServicePrincipalName
Copy PS C:\> Get-DomainUser -UACFilter PASSWD_NOTREQD | Select-Object samaccountname,useraccountcontrol
Copy PS C:\> .\SharpView.exe Get-DomainUser -Identity sol
Copy sudo crackmapexec smb 13.13.13.13 -u sol -p PASSWORD123 --users
sudo crackmapexec smb 13.13.13.13 -u sol -p PASSWORD123 --loggedon-users # Logged on
Copy rpcclient -U "" -N 13.13.13.13 # Get RPC Console
rpcclient $> enumdomusers # Enum all users
rpcclient $> queryuser 0x371 # Enum Specifical User by it's RID
Copy python3 windapsearch.py --dc-ip 13.13.13.13 -u sol@militech.local -p PASSWORD123 --da
Copy python3 windapsearch.py --dc-ip 13.13.13.13 -u sol@militech.local -p PASSWORD123 -PU