Skip to content

get Command

Retrieve and enumerate various objects from Active Directory.

Usage

pwnAD [auth options] get <subcommand> [arguments]

Subcommands

User Enumeration

Subcommand Description
user Get detailed info for a specific user
users List all domain users
users_description Users with description field set
users_with_admin_count Users with adminCount=1
protected_users Members of Protected Users group

Group Enumeration

Subcommand Description
groups List all domain groups
members List members of a specific group
membership List group memberships for an account

Computer Enumeration

Subcommand Description
computers List all domain computers
DC List domain controllers
servers List servers

Delegation Enumeration

Subcommand Description
constrained_delegation Accounts with constrained delegation
unconstrained_delegation Accounts with unconstrained delegation
RBCD Accounts with RBCD configured
not_trusted_for_delegation Accounts not trusted for delegation

Attack Surface Enumeration

Subcommand Description
asreproastables Accounts vulnerable to AS-REP roasting
kerberoastables Accounts vulnerable to Kerberoasting
password_not_required Accounts with PASSWD_NOTREQD flag
passwords_dont_expire Accounts with non-expiring passwords
spn Accounts with Service Principal Names

Other

Subcommand Description
CA Certificate Authorities
OU Organizational Units
containers AD containers
accounts_with_sid_histoy Accounts with SID history

Examples

User Enumeration

# Get all users
pwnAD --dc-ip 192.168.1.10 -d domain.local -u admin -p 'Pass!' get users

# Get specific user details
pwnAD --dc-ip 192.168.1.10 -d domain.local -u admin -p 'Pass!' get user administrator

# Users with descriptions (might contain passwords)
pwnAD --dc-ip 192.168.1.10 -d domain.local -u admin -p 'Pass!' get users_description

Group Enumeration

# List all groups
pwnAD --dc-ip 192.168.1.10 -d domain.local -u admin -p 'Pass!' get groups

# Get Domain Admins members
pwnAD --dc-ip 192.168.1.10 -d domain.local -u admin -p 'Pass!' get members "Domain Admins"

# Get user's group memberships
pwnAD --dc-ip 192.168.1.10 -d domain.local -u admin -p 'Pass!' get membership administrator

Attack Surface Discovery

# Find Kerberoastable accounts
pwnAD --dc-ip 192.168.1.10 -d domain.local -u lowpriv -p 'Pass!' get kerberoastables

# Find AS-REP roastable accounts
pwnAD --dc-ip 192.168.1.10 -d domain.local -u lowpriv -p 'Pass!' get asreproastables

# Find accounts with PASSWD_NOTREQD
pwnAD --dc-ip 192.168.1.10 -d domain.local -u lowpriv -p 'Pass!' get password_not_required

Delegation Discovery

# Unconstrained delegation (potential for credential theft)
pwnAD --dc-ip 192.168.1.10 -d domain.local -u admin -p 'Pass!' get unconstrained_delegation

# Constrained delegation (potential for privilege escalation)
pwnAD --dc-ip 192.168.1.10 -d domain.local -u admin -p 'Pass!' get constrained_delegation

# RBCD targets
pwnAD --dc-ip 192.168.1.10 -d domain.local -u admin -p 'Pass!' get RBCD

Infrastructure Discovery

# Domain controllers
pwnAD --dc-ip 192.168.1.10 -d domain.local -u admin -p 'Pass!' get DC

# Certificate authorities
pwnAD --dc-ip 192.168.1.10 -d domain.local -u admin -p 'Pass!' get CA

# All computers
pwnAD --dc-ip 192.168.1.10 -d domain.local -u admin -p 'Pass!' get computers

Interactive Mode Usage

pwnAD -i --dc-ip 192.168.1.10 -d domain.local -u lowpriv -p 'Pass!'

# Quick enumeration workflow
pwnAD [domain.local\lowpriv]> get users
pwnAD [domain.local\lowpriv]> get kerberoastables
pwnAD [domain.local\lowpriv]> get asreproastables
pwnAD [domain.local\lowpriv]> get constrained_delegation
pwnAD [domain.local\lowpriv]> get unconstrained_delegation

Reconnaissance Workflow

A typical reconnaissance workflow:

# 1. Start with user enumeration
get users
get users_description  # Check for passwords in descriptions

# 2. Check attack surface
get kerberoastables
get asreproastables
get password_not_required

# 3. Identify high-value targets
get members "Domain Admins"
get members "Enterprise Admins"
get users_with_admin_count

# 4. Check delegation
get unconstrained_delegation
get constrained_delegation
get RBCD

# 5. Infrastructure mapping
get DC
get CA
get computers