Living-Off-the-Land Binaries (LOLBins) for AD enumeration

Work-in-progress

Goal: Enumerate Domain Users, Groups, Computers, Trusts, Sessions, Permissions, Kerberos tickets, etc., using only built-in Windows binaries.

All commands are 100% native (no third-party tools, no PowerView, no BloodHound required). All commands tested on Windows 10/11 & Server 2019/2022/2025

Quickly confirms domain membership and basic OS info

# 1. systeminfo
systeminfo | findstr /B /C:"Domain"
# 2. whoami /all
# Displays current user, SIDs, privileges, and all group memberships (including nested)
whoami /all
# 3. echo %logonserver%
# Shows the Domain Controller you authenticated to during logon
echo %logonserver%
# 4. nltest /dclist:domain.local
# Lists every Domain Controller in the current domain (best native DC discovery)
nltest /dclist:corp.local
# 5. nltest /domain_trusts
# Enumerates all domain and forest trusts (critical for lateral movement paths)
nltest /domain_trusts
# 6. net accounts /domain
# Shows domain password policy and lockout settings
net accounts /domain

PowerShell One-Liners (Native ADSI – no RSAT needed)

Advanced PowerShell ADSI (No RSAT/AD Module Required)

Last updated