🙈
Pentesting
search
Ctrlk
  • Tenaka.net
  • Linkschevron-right
  • Recon
    • NMAPchevron-right
  • Enumeration
    • NMAPchevron-right
    • Windowschevron-right
      • Escalation Checks
      • Userschevron-right
        • Users PS
        • Users ADSI
        • Users CMD
      • Host Config
      • Updates (All)chevron-right
      • Domainchevron-right
      • Computerschevron-right
      • Componentschevron-right
      • Networkingchevron-right
      • Services
      • Passwordschevron-right
      • Groupschevron-right
      • Misconfigurationschevron-right
      • Files and Folderschevron-right
      • invoke-command
      • Registry
    • Linuxchevron-right
    • Kalichevron-right
    • Certificateschevron-right
    • FTP
    • Webchevron-right
    • DNSchevron-right
    • LDAP \ AD \ DCchevron-right
    • Group Policychevron-right
    • SMBchevron-right
    • Databaseschevron-right
    • Exploit-DB
    • WinRMchevron-right
    • Fileschevron-right
    • Miscchevron-right
    • Python
  • Exploitation
    • FTPchevron-right
    • Meterpreterchevron-right
    • MSVenomchevron-right
    • Reverse Shellschevron-right
    • Metasploitchevron-right
    • Burpsuitechevron-right
  • Boxeschevron-right
  • Useful Commands
    • PowerSploit \ Empirechevron-right
    • Transfer Datachevron-right
    • Password Crackingchevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Enumerationchevron-right
  2. Windows

Users

Users PSchevron-rightUsers ADSIchevron-rightUsers CMDchevron-right
PreviousEscalation Checkschevron-leftNextUsers PSchevron-right

Last updated 3 years ago