Security identifiers SIDs
Windows uses a SID to identify entities. A SID is a unique value assigned to each entity, or principal, that can be authenticated by Windows, such as users and groups. The SID for local accounts and groups is generated by the Local Security Authority (LSA), and for domain users and domain groups, it's generated on a Domain Controller (DC). The SID cannot be changed and is generated when the user or group is created.
The SID string consists of different parts, delimited by "-", and represented by the placeholders "S", "R", "X", and "Y" in the following listing. This representation is the fundamental structure of a SID.
Next, we can use lookupsid.py , an Impacket script used for querying a Windows system to obtain information about the SID associated with a given user or group.
The tool will give us back the SID for the domain and the RIDs for each user and group that could be used to create their SID in the format DOMAIN_SID-RID.
If we just want to get the Domain SID, we can filter it out:
Results: S-1-5-21-2806153819-209893948-922872689
We will perform a SID enumeration on the target system and filter the results to find information related to the Enterprise Admins group in the Active Directory (AD) domain. For filtering we will use the RID of the Enterprise Admins group. Here is a handy list of well-known SIDs.
Result:
As the domain SID was: S-1-5-21-3842939050-3880317879-2865463114 and the RID is 519, the SID of "Enterprise Admin" group is S-1-5-21-3842939050-3880317879-2865463114-519 .
Enumerating GPO Names with PowerView
See more on Attacking Domain Trusts: ExtraSids Attack - Mimikatz
Last update: 2026-02-02 Created: February 2, 2026 21:10:28