Adversaries may attempt to get a listing of domain accounts. This information can help adversaries determine which domain accounts exist to aid in follow-on behavior.
Commands such as
net user /domain and
net group /domain of the Net utility,
dscacheutil -q groupon macOS, and
ldapsearch on Linux can list domain users and groups.
Sykipot may use
|M1028||Operating System Configuration||
Prevent administrator accounts from being enumerated when an application is elevating through UAC since it can lead to the disclosure of account names. The Registry key is located at
|ID||Data Source||Data Component||Detects|
Monitor for execution of commands and arguments associated with enumeration or information gathering of domain accounts and groups, such as
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment, and also to an extent in normal network operations. Therefore discovery data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained.
|DS0009||Process||OS API Execution||
Monitor for API calls that may attempt to gather information about domain accounts such as type of user, privileges and groups.
Monitor for processes that can be used to enumerate domain accounts and groups, such as