ldapdomaindump
Using the valid domain credential, I can use ldapdomaindump to get a graphical overview about the target domain
┌──(kali㉿kali)-[~/…/htb/labs/cascade/ldapdomaindump]
└─$ ldapdomaindump CASCADE.LOCAL -u 'CASCADE.LOCAL\r.thompson' -p 'rY4n5eva' -n $IP --no-json --no-grep
[*] Connecting to host...
[*] Binding to host
[+] Bind OK
[*] Starting domain dump
[+] Domain dump finished
Done
Computers
There’s only the DC host
Groups
These are none default domain groups
Users
There are a number of users that appear most valuable