dsquery is a command-line utility that can be used to query Active Directory for information from a system within a domain. [1] It is typically installed only on Windows Server versions but can be installed on non-server variants through the Microsoft-provided Remote Server Administration Tools bundle.
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1087 | .002 | Account Discovery: Domain Account |
dsquery can be used to gather information on user accounts within a domain.[1][2] |
Enterprise | T1482 | Domain Trust Discovery |
dsquery can be used to gather information on domain trusts with |
|
Enterprise | T1069 | .002 | Permission Groups Discovery: Domain Groups |
dsquery can be used to gather information on permission groups within a domain.[1][2] |
Enterprise | T1082 | System Information Discovery |
dsquery has the ability to enumerate various information, such as the operating system and host name, for systems within a domain.[2] |
ID | Name | Description |
---|---|---|
C0017 | C0017 |
During C0017, APT41 used multiple dsquery commands to enumerate various Active Directory objects within a compromised environment.[2] |
C0012 | Operation CuckooBees | |
C0014 | Operation Wocao |
During Operation Wocao, threat actors used dsquery to retrieve all subnets in the Active Directory.[6] |