User Enumeration

User Enumeration and Password Policy Assessment

User enumeration is a critical phase in penetration testing, allowing you to identify valid user accounts that could potentially be leveraged for authentication attacks. Combined with password policy assessment, this information helps you understand the restrictions placed on accounts and plan your attack strategy accordingly.

Password Policy Assessment

Before attempting any authentication attacks, it's essential to understand the target's password policy to avoid account lockouts and ensure efficient testing.

Windows Domain Password Policies

Using CrackMapExec

crackmapexec smb 172.16.5.5 -u avazquez -p Password123 --pass-pol

This provides information about:

  • Minimum password length

  • Password complexity requirements

  • Password history count

  • Maximum password age

  • Account lockout thresholds and duration

Using enum4linux

enum4linux -P 172.16.5.5

Using LDAP Queries

Understanding Policy Output

A typical Windows domain password policy includes:

  • Password history: Number of unique passwords before reuse (e.g., 24 passwords)

  • Maximum password age: Time before password expiration (e.g., 42 days)

  • Minimum password age: Time before password can be changed again (e.g., 1 day)

  • Minimum password length: Character requirement (e.g., 7 characters)

  • Password complexity: Requirements for different character types

  • Account lockout threshold: Failed attempts before lockout (e.g., 5 attempts)

  • Account lockout duration: Time account remains locked (e.g., 30 minutes)

  • Account lockout observation window: Time window for counting failed attempts

User Enumeration Techniques

Windows Domain User Enumeration

Using enum4linux

Using rpcclient

Using CrackMapExec

Using LDAP Queries

Using Kerbrute

Linux System User Enumeration

Local Users

LDAP Users

Web Application User Enumeration

Common Enumeration Points

  • Login pages

  • Registration forms

  • Password reset functionality

  • User profile pages

  • Error messages

Techniques

Creating User Lists

From Organizational Information

  1. Company websites: Extract names from "About Us" and "Team" pages

  2. LinkedIn/social media: Find employees and their naming conventions

  3. Email leaks: Extract usernames from leaked email addresses

  4. Press releases/news articles: Identify executives and key personnel

Username Format Identification

Common username formats:

  • first.last (john.smith)

  • firstlast (johnsmith)

  • first_last (john_smith)

  • flast (jsmith)

  • first.l (john.s)

  • first_initial_last (jsmith)

  • last_initial_first (smithj)

Generating Username Lists

Last updated