RID_ENUM
Tool and Usage
Project details
- License
- Custom license
- Programming language
- Python
- Author
- David Kennedy
- Latest release
- 1.7
- Latest release date
Project health
Links
GitHub project |
Why this tool?
The RID_ENUM utility (or Rid Enum) performs a cycling attack to attempt retrieving all users from a Windows domain controller. It focuses on retrieving identities from the domain admins group. The attack will work to versions, with Windows 2003 being the latest. This was to ensure compatibility with previous versions of Windows. Windows 2008 and later will not allow this type of enumeration to happen.
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
Strengths
- + The source code of this software is available
Installation
Dependencies
Several dependencies are required to use RID_ENUM.
- pexpect
RID_ENUM alternatives
Similar tools to RID_ENUM:
LinEnum
LinEnum can be used during penetration tests to perform scripted local Linux enumeration and check for privilege escalations.
massh-enum
Massh-enum is a user enumeration tool for OpenSSH with the goal to find valid usernames. Read how it works in this review.
This tool page was updated at . Found an improvement? Help the community by submitting an update.
Related tool information
Categories
This tool is categorized as a system enumeration tool.