dsquery is a command-line utility that can be used to query Active Directory for information from a system within a domain. [1] It is typically installed only on Windows Server versions but can be installed on non-server variants through the Microsoft-provided Remote Server Administration Tools bundle.
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1482 | 域信任发现 |
dsquery can be used to gather information on domain trusts with |
|
| Enterprise | T1069 | .002 | 权限组发现: Domain Groups |
dsquery can be used to gather information on permission groups within a domain.[1][3] |
| Enterprise | T1082 | 系统信息发现 |
dsquery has the ability to enumerate various information, such as the operating system and host name, for systems within a domain.[3] |
|
| Enterprise | T1087 | .002 | 账号发现: Domain Account |
dsquery can be used to gather information on user accounts within a domain.[1][3] |
| ID | Name | Description |
|---|---|---|
| C0017 | C0017 |
During C0017, APT41 used multiple dsquery commands to enumerate various Active Directory objects within a compromised environment.[3] |
| C0012 | Operation CuckooBees | |
| C0014 | Operation Wocao |
During Operation Wocao, threat actors used dsquery to retrieve all subnets in the Active Directory.[6] |