Skip to content

Detect enumeration of security groups in Domain Controller

License

Notifications You must be signed in to change notification settings

nov3mb3r/laelaPS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 

Repository files navigation

laelaPS

Similar to the mythological dog that never failed to catch what he was hunting, laelaPS is a tool designed to identify MITRE ATT&CK techniques that are used in attacks against Active Directory, based on events recorded on Domain Controller:

  • Permission Groups Discovery (T1069)
  • Account Discovery (T1087)

Common tools that are used to enumeratate users and groups inside a domain are:

Usage

Using administrative privileges, run the laelaPS on the Domain Controller

PS >.\laelaPS.ps1

The report will include the enumerated groups, along with the timestamp of the attack and the user that requested the enumeration

Remote usage

Using administrative privileges, specify the remote Domain Controller server

PS >.\laelaPS.ps1 -server <DC_IP_addr>

Note

Enumeration is not reported when group members are enumerated using Active Directory Users and Computers snap-in

About

Detect enumeration of security groups in Domain Controller

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published