Port scanning
In an Active Directory domain, domain controllers can be easily spotted depending on what services they host. Each service is usually accessible specific TCP and/or UDP port(s) making the DCs stand out in the network. Here is a list of ports to look for when hunting for domain controllers.
53/TCPand53/UDPfor DNS88/TCPfor Kerberos authentication135/TCPand135/UDPMS-RPC epmapper (EndPoint Mapper)137/TCPand137/UDPfor NBT-NS138/UDPfor NetBIOS datagram service139/TCPfor NetBIOS session service389/TCPfor LDAP636/TCPfor LDAPS (LDAP over TLS/SSL)445/TCPand445/UDPfor SMB464/TCPand445/UDPfor Kerberos password change3268/TCPfor LDAP Global Catalog3269/TCPfor LDAP Global Catalog over TLS/SSL
The nmap utility can be used to scan for open ports in an IP range.
# -sS for TCP SYN scan
# -n for no name resolution
# --open to only show (possibly) open port(s)
# -p for port(s) number(s) to scan
nmap -sS -n --open -p 88,389 $IP_RANGELast updated
Was this helpful?