With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
0 | |
00 | |
01 | |
02 | |
03 | |
1 | |
1.0 | |
10 | |
100 | |
1000 |
# PowerView's last major overhaul is detailed here: http://www.harmj0y.net/blog/powershell/make-powerview-great-again/ | |
# tricks for the 'old' PowerView are at https://gist.github.com/HarmJ0y/3328d954607d71362e3c | |
# the most up-to-date version of PowerView will always be in the dev branch of PowerSploit: | |
# https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1 | |
# New function naming schema: | |
# Verbs: | |
# Get : retrieve full raw data sets | |
# Find : ‘find’ specific data entries in a data set |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
# Exploit Title: Jenzabar 9.2.x through 9.2.2 allows /ics?tool=search&query= XSS. | |
# Google Dork: Jenzabar — v9.2.0 / v9.2.1 / v9.2.2 | |
# Date: 2021–02–05 | |
# Exploit Author: y0ung_dst | |
# Vendor Homepage: https://jenzabar.com | |
# Version: Jenzabar — v9.2.0-v9.2.1-v9.2.2 (and maybe other versions) | |
# Tested on: Windows 10 | |
# CVE : CVE-2021-26723 | |