Academy

Module 2 Β· AD Enumeration β€” Seeing Everything πŸ”’

Manish Garg
Manish Garg Associate CISSP Β· RingSafe
April 22, 2026
4 min read

The first step of every AD attack is enumeration. Before exploitation, before lateral movement, before privilege escalation β€” you map the terrain. AD’s fundamental design choice of “authenticated users read everything” means attackers and defenders enumerate with the same tools, seeing the same data. The difference is what they do with it.

Why enumeration works so well

AD’s LDAP schema is open by design. Any authenticated user can query for:

  • All user objects (names, descriptions, email, employee IDs, last logon)
  • All group memberships (including privileged groups)
  • All computer objects (hostnames, operating systems, last logon)
  • All OU structure
  • All Group Policy Objects (name, links, CDN paths to SYSVOL)
  • All ACLs on nearly every object
  • All trust relationships to other forests
  • All service principal names (attack target for Kerberoasting)

This information was intended for sysadmins. It is equally useful to anyone with any authenticated credential. And getting one authenticated credential is usually trivial (Responder, phishing, password spray).

πŸ” Intermediate Module Β· Basic Tier

Continue reading with Basic tier (β‚Ή499/month)

You've read 27% of this module. Unlock the remaining deep-dive, quiz, and every other Intermediate module.

99+ modulesAll levels up to this tier
20-question quizzesUnlimited retries with explanations
Completion certificatesShareable on LinkedIn
5 more sections locked below