🖊️ Author: Nairuz Abulhul

🌐 Blog: R3dbuck3t

Table of Contents

Initial Enumeration (No domain Creds)

Below are some of the key data points that we should be looking for

Techniques

Capturing Traffic - Identifying Hosts

LLMNR/NBT-NS Poisoning -Identify Users

Enumerating Protocols - Identify Users

Password Attacks - Hunt for Domain Creds

Identifying Potential Vulnerabilities