Windows Gather Active Directory Users
This module will enumerate user accounts in the default Active Domain (AD) directory and stores them in the database. If GROUP_MEMBER is set to the DN of a group, this will list the members of that group by performing a recursive/nested search (i.e. it will list users who are members of groups that are members of groups that are members of groups (etc) which eventually include the target group DN.
- Ben Campbell <eat_meatballs [at] hotmail.co.uk>
- Carlos Perez <carlos_perez [at] darkoperator.com>
- Stuart Morgan <stuart.morgan [at] mwrinfosecurity.com>
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
msf > use post/windows/gather/enum_ad_users msf post(enum_ad_users) > sessions ...sessions... msf post(enum_ad_users) > set SESSION <session-id> msf post(enum_ad_users) > show options ...show and set options... msf post(enum_ad_users) > run