# PowerView: Active Directory Enumeration

This lab explores a couple of common cmdlets of PowerView that allows for Active Directory/Domain enumeration.

## Get-NetDomain

Get current user's domain:

![](/files/-LLzd9N9rZOj1zqIhSBF)

## Get-NetForest

Get information about the forest the current user's domain is in:

![](/files/-LLzddnEPdmu7Q8SfouR)

## Get-NetForestDomain

Get all domains of the forest the current user is in:

![](/files/-LLzf0S10E1OSY7T7k9H)

## Get-NetDomainController

Get info about the DC of the domain the current user belongs to:

![](/files/-LLzfOFLgrOxW6Y-bR52)

## Get-NetGroupMember

Get a list of domain members that belong to a given group:

![](/files/-LLzgA_HPmbcYClpCNOt)

## Get-NetLoggedon

Get users that are logged on to a given computer:

![](/files/-LLzhPeRsZfpet96kWuT)

## Get-NetDomainTrust

Enumerate domain trust relationships of the current user's domain:

![](/files/-LLzhpw5yYwcsbZ5Arzk)

## Get-NetForestTrust

Enumerate forest trusts from the current domain's perspective:

![](/files/-LLzi97c12Py-wn6iGz1)

## Get-NetProcess

Get running processes for a given remote machine:

```csharp
Get-NetProcess -ComputerName dc01 -RemoteUserName offense\administrator -RemotePassword 123456 | ft
```

![](/files/-LQIu2VkugNWZBJbC43M)

## Invoke-MapDomainTrust

Enumerate and map all domain trusts:

![](/files/-LLzjb4pR0R0QZFWnSEL)

## Invoke-ShareFinder

Enumerate shares on a given PC - could be easily combines with other scripts to enumerate all machines in the domain:

![](/files/-LLzkAMHWApp9EX94TzE)

## Invoke-UserHunter

Find machines on a domain or users on a given machine that are logged on:

![](/files/-LLzlbfMrGPxEcvbX6E1)

## References

{% embed url="<https://github.com/PowerShellMafia/PowerSploit>" %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/active-directory-enumeration-with-powerview.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
