Course 16 - Red Team Ethical Hacking Beginner Course | Episode 3: Essential Windows Domain and Host Enumeration
In this lesson, you’ll learn about:
The purpose and importance of network enumeration in red teaming
Windows Domain Enumeration techniques for situational awareness
Host Enumeration methods for analyzing a specific target system
How user sessions, services, and processes influence attack paths
Why continuous enumeration is critical in dynamic enterprise networks
Overview This lesson provides a comprehensive guide to essential red team enumeration techniques used to gather intelligence within a Windows enterprise environment. Enumeration is a critical phase of any red team operation, as it allows security professionals to understand the structure, users, systems, and behavior of a network without relying on exploits. The lesson is divided into two main areas:
Host Enumeration – collecting detailed information from a specific system
Domain Enumeration Domain enumeration focuses on identifying high-level Active Directory information that helps red teamers understand how the environment is structured and where valuable targets exist. Identifying Domain Information
Discovering the current domain name (e.g., fun.com)
Identifying the Domain Controller (DC) and its IP address
Confirming domain role ownership and authentication authority
Domain Policy and Infrastructure
Retrieving domain policies to understand:
Password requirements
Lockout thresholds
Security enforcement levels
Enumerating domain-joined computer hostnames
User Session Enumeration One of the most critical objectives of domain enumeration is identifying logged-in users, since credentials and tokens may reside in memory. Techniques demonstrated include:
Listing users logged into all domain computers
Identifying privileged accounts logged into sensitive systems (e.g., administrators on the domain controller)
Detecting regular users logged into workstations
Narrowing enumeration to a specific target host to identify active sessions
This information is highly time-sensitive, as logged-in users can change frequently. Host Enumeration Host enumeration focuses on gathering deep, system-level intelligence from a specific target machine once access has been obtained. Basic System Information
Hostname
Operating system version (e.g., Windows 10 Enterprise)
System architecture (x64 / x86)
Domain membership
Installed hotfixes and patch levels
Current User Intelligence
Logged-in username
User Security Identifier (SID)
Important for advanced techniques such as ticket-based attacks
Group memberships
Assigned user privileges
Local Privilege Analysis
Enumerating members of the local administrators group
Identifying misconfigurations or excessive privileges
Service and Process Enumeration Understanding what is running on a system reveals potential attack surfaces and persistence opportunities. Services
Listing running services
Identifying startup services
Analyzing service state and startup mode
Detecting services running with elevated privileges
Ports and Processes
Enumerating open and listening ports
Identifying processes bound to specific ports
Mapping processes to:
Process IDs
Executable names
Full file system paths
This helps determine whether a service is custom, outdated, or potentially vulnerable. Application and File System Enumeration Installed Applications
Listing installed software (e.g., packet analyzers like Wireshark)
Identifying tools that may indicate:
Developer systems
Admin workstations
Security monitoring presence
File System Analysis
Recursively searching the file system for files containing specific text
Locating files by name (e.g., flags or configuration files)
Identifying hidden files and directories
These techniques help uncover credentials, scripts, backups, or sensitive data. Why Enumeration Is Critical
Network environments are dynamic
Logged-in users change constantly
Services may restart or move
New systems may appear or disappear
Because of this, enumeration is not a one-time activity—it must be continuous throughout a red team operation. Key Educational Takeaways
Enumeration builds context, not exploits
Logged-in users often matter more than vulnerabilities
Privileges and services define real attack paths
Native system tools provide powerful visibility
Effective red teaming depends on accurate, up-to-date intelligence
You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy
Course 16 - Red Team Ethical Hacking Beginner Course | Episode 3: Essential Windows Domain and Host Enumeration
In this lesson, you’ll learn about:
The purpose and importance of network enumeration in red teaming
Windows Domain Enumeration techniques for situational awareness
Host Enumeration methods for analyzing a specific target system
How user sessions, services, and processes influence attack paths
Why continuous enumeration is critical in dynamic enterprise networks
Overview This lesson provides a comprehensive guide to essential red team enumeration techniques used to gather intelligence within a Windows enterprise environment. Enumeration is a critical phase of any red team operation, as it allows security professionals to understand the structure, users, systems, and behavior of a network without relying on exploits. The lesson is divided into two main areas:
Host Enumeration – collecting detailed information from a specific system
Domain Enumeration Domain enumeration focuses on identifying high-level Active Directory information that helps red teamers understand how the environment is structured and where valuable targets exist. Identifying Domain Information
Discovering the current domain name (e.g., fun.com)
Identifying the Domain Controller (DC) and its IP address
Confirming domain role ownership and authentication authority
Domain Policy and Infrastructure
Retrieving domain policies to understand:
Password requirements
Lockout thresholds
Security enforcement levels
Enumerating domain-joined computer hostnames
User Session Enumeration One of the most critical objectives of domain enumeration is identifying logged-in users, since credentials and tokens may reside in memory. Techniques demonstrated include:
Listing users logged into all domain computers
Identifying privileged accounts logged into sensitive systems (e.g., administrators on the domain controller)
Detecting regular users logged into workstations
Narrowing enumeration to a specific target host to identify active sessions
This information is highly time-sensitive, as logged-in users can change frequently. Host Enumeration Host enumeration focuses on gathering deep, system-level intelligence from a specific target machine once access has been obtained. Basic System Information
Hostname
Operating system version (e.g., Windows 10 Enterprise)
System architecture (x64 / x86)
Domain membership
Installed hotfixes and patch levels
Current User Intelligence
Logged-in username
User Security Identifier (SID)
Important for advanced techniques such as ticket-based attacks
Group memberships
Assigned user privileges
Local Privilege Analysis
Enumerating members of the local administrators group
Identifying misconfigurations or excessive privileges
Service and Process Enumeration Understanding what is running on a system reveals potential attack surfaces and persistence opportunities. Services
Listing running services
Identifying startup services
Analyzing service state and startup mode
Detecting services running with elevated privileges
Ports and Processes
Enumerating open and listening ports
Identifying processes bound to specific ports
Mapping processes to:
Process IDs
Executable names
Full file system paths
This helps determine whether a service is custom, outdated, or potentially vulnerable. Application and File System Enumeration Installed Applications
Listing installed software (e.g., packet analyzers like Wireshark)
Identifying tools that may indicate:
Developer systems
Admin workstations
Security monitoring presence
File System Analysis
Recursively searching the file system for files containing specific text
Locating files by name (e.g., flags or configuration files)
Identifying hidden files and directories
These techniques help uncover credentials, scripts, backups, or sensitive data. Why Enumeration Is Critical
Network environments are dynamic
Logged-in users change constantly
Services may restart or move
New systems may appear or disappear
Because of this, enumeration is not a one-time activity—it must be continuous throughout a red team operation. Key Educational Takeaways
Enumeration builds context, not exploits
Logged-in users often matter more than vulnerabilities
Privileges and services define real attack paths
Native system tools provide powerful visibility
Effective red teaming depends on accurate, up-to-date intelligence
You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy