Living-Off-the-Land Binaries (LOLBins) for AD enumeration
Work-in-progress
Goal: Enumerate Domain Users, Groups, Computers, Trusts, Sessions, Permissions, Kerberos tickets, etc., using only built-in Windows binaries.
All commands are 100% native (no third-party tools, no PowerView, no BloodHound required). All commands tested on Windows 10/11 & Server 2019/2022/2025
Quickly confirms domain membership and basic OS info
# 1. systeminfo
systeminfo | findstr /B /C:"Domain"# 2. whoami /all
# Displays current user, SIDs, privileges, and all group memberships (including nested)
whoami /all# 3. echo %logonserver%
# Shows the Domain Controller you authenticated to during logon
echo %logonserver%# 4. nltest /dclist:domain.local
# Lists every Domain Controller in the current domain (best native DC discovery)
nltest /dclist:corp.local# 5. nltest /domain_trusts
# Enumerates all domain and forest trusts (critical for lateral movement paths)
nltest /domain_trusts# 6. net accounts /domain
# Shows domain password policy and lockout settings
net accounts /domainPowerShell One-Liners (Native ADSI β no RSAT needed)
Advanced PowerShell ADSI (No RSAT/AD Module Required)
Last updated