You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Python svcript uses strictly LDAP3 to enumerate the AD users (use the -dc-ip parameter to specify your Domain Controller IP).
401
+
Then it will attempt to write "temp" to attributes to determine if any is writeable.
402
+
Although not the most elegent solution - it works! It will write a users.cvs file, which should only contain your own AD account-any others are worhty of ivestigation!
The Python svcript uses strictly LDAP3 to enumerate the AD users (use the -dc-ip parameter to specify your Domain Controller IP).
444
-
Then it will attempt to write "temp" to attributes to determine if any is writeable.
445
-
Although not the most elegent solution - it works! It will write a users.cvs file, which should only contain your own AD account-any others are worhty of ivestigation!
The PowerShell version does the same thing - but with a twist.
451
-
Firstly, it will try to use ADWS first before falling back to LDAP.
452
-
Secondly, it also produces a ADUsers.csv output file but it contains the "WriteableAttributes" for each user.
453
-
Users with excessive permissions will stand out!
469
+
Disables Windows Defender Services. Need to run as admin.
454
470
455
-
Use with parameters and it will use your current Windows account. You can specify like so:
456
-
`-Dc 1.2.0.10 -Out investigate_UsersPS.csv`
471
+
If you want to automatically do so after every reboot & login event, run this PowerSHell to create a Scheduled Task which will run that .ps1 for you under SYSTEM.
0 commit comments