Enumerate

Users

Local

whoami

Current user

whoami /priv

Current user privileges

qwinsta

Active user sessions

net session

Current logged on users

psloggedon

Current logged on users

wmic computersystem get username

Current logged on users

net user

User accounts

Get-CimInstance -ClassName Win32_UserAccount

User accounts

Get-LocalUser

User accounts (PowerShell)

Get-WmiObject -Class Win32_UserAccount

User accounts

wmic useraccount get name,sid

SIDs for all users

wmic useraccount where name="USER" get sid

SID for specific user

net user <username>

User properties

wmic useraccount list /format:list

User properties

wmic useraccount get name,fullname,sid

Specific user properties

net accounts

Default account settings

Retrieves information about a specific user:

Get-WmiObject -Class Win32_UserAccount | Where-Object {$_.Name -eq "<username>"} | Select-Object Name, FullName, Description

Default username, default domainname, default shell:

reg query "HKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon"

Domain

net user /domain

Active Directory users

Get-ADUser -Filter *

Active Directory users (requires AD module)

dsquery user

Active Directory users (requires AD)

Groups

Local

net localgroup

Groups

Get-LocalGroup

Groups

net localgroup <groupName>

Group properties

wmic group /format:

Group properties

wmic group where "name='GroupName'" get /format:

Group properties

net localgroup "Users"

Members

net localgroup "Administrators"

Members

Get-LocalGroupMember -Group "Users"

Members

Get-LocalGroupMember -Group "Administrators"

Members

Get all groups:

wmic /NAMESPACE:\\root\directory\ldap PATH ds_group GET ds_samaccountname

Members of the group:

wmic /NAMESPACE:\\root\directory\ldap PATH ds_group where "ds_samaccountname='Domain Admins'" Get ds_member /Value

Members of the group:

wmic path win32_groupuser where (groupcomponent="win32_group.name="domain admins",domain="DOMAIN_NAME"")

Domain

Get-ADGroupMember -Identity "GroupName"

Domain group members

dsget group "GroupDN" -members

Domain group members

ldapsearch -x -b "dc=example,dc=com" "(objectClass=group)"

AD groups using LDAP search

Get-ADGroup -Filter *

Domain groups

dsquery group

Domain groups

net group

Domain groups

net group /domain

Domain groups

net localgroup administrators /domain

Domain group members

net group "Domain Admins" /domain

Domain groups members

net group "domain computers" /domain

Hosts connected to the domain

net group "Domain Controllers" /domain

DCs

Sysinternals

psloggedon

Looking for anyone using resources on the system. Connections to share drive.

psgetsid

Shows your user SID

Last updated

Was this helpful?