With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| OSCP Prep class | |
| Day 1: Exploit Research | |
| http://www.securitytube.net/groups?operation=view&groupId=7 | |
| Day 2: Python Hacking | |
| https://www.youtube.com/playlist?list=PLEA1FEF17E1E5C0DA (videos 1-10 if you are a complete beginner) | |
| https://www.youtube.com/playlist?list=PL1A2CSdiySGLtKwqBnqj9BON6QQjWkP4n (entire playlist) | |
| #!/bin/bash | |
| ############################################################################################################ | |
| # ---------------------------------------------------------------------- | |
| # ASN/IPv4/Prefix lookup tool. Uses Team Cymru's whois service for data. | |
| # ---------------------------------------------------------------------- | |
| # example usage: | |
| # asn <ASnumber> -- to lookup matching ASN data. Supports "as123" and "123" formats (case insensitive) | |
| # asn <IP.AD.DR.ESS> -- to lookup matching route and ASN data | |
| # asn <ROUTE> -- to lookup matching ASN data |
| # SECUREAUTH LABS. Copyright 2018 SecureAuth Corporation. All rights reserved. | |
| # | |
| # This software is provided under a slightly modified version | |
| # of the Apache Software License. See the accompanying LICENSE file | |
| # for more information. | |
| # | |
| # Description: Performs various techniques to dump hashes from the | |
| # remote machine without executing any agent there. | |
| # For SAM and LSA Secrets (including cached creds) | |
| # we try to read as much as we can from the registry |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| #!/bin/bash | |
| ##### (Cosmetic) Colour output | |
| RED="\033[01;31m" # Issues/Errors | |
| GREEN="\033[01;32m" # Success | |
| YELLOW="\033[01;33m" # Warnings/Information | |
| BLUE="\033[01;34m" # Heading | |
| BOLD="\033[01;01m" # Highlight | |
| RESET="\033[00m" # Normal |
| Retrieves all of the trust relationships for this domain - Does not Grab Forest Trusts | |
| ([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).GetAllTrustRelationships() | |
| Grab Forest Trusts. | |
| ([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).GetAllTrustRelationships() | |
| #!/bin/bash | |
| ##### (Cosmetic) Colour output | |
| RED="\033[01;31m" # Issues/Errors | |
| GREEN="\033[01;32m" # Success | |
| YELLOW="\033[01;33m" # Warnings/Information | |
| BLUE="\033[01;34m" # Heading | |
| BOLD="\033[01;01m" # Highlight | |
| RESET="\033[00m" # Normal | |
| echo -e "${GREEN}" | |
| ##################################installation starts ###################################### |
| =======================HOST DISCOVERY=========================================== | |
| Host discovery con PING: | |
| $ for octect in (seq 0 254) | |
| echo "Pinging [X.X.X.$octect]" | |
| ping -c 2 10.150.150.$octect | grep "bytes from" | awk '{print $4}' | uniq -d | cut -d ":" -f 1 | tee -a targets.list | |
| end | |
| Host discovery con NMAP IMCP o ARP | |
| $sudo nmap -vv -sn -PE 10.150.150.0/24 -oG HOSTDISCOVERY_ICMP.gnmap |
| #!/bin/bash | |
| MODPROBEFILE="/etc/modprobe.d/CIS.conf" | |
| #MODPROBEFILE="/tmp/CIS.conf" | |
| ANSWER=0 | |
| analyze_part () { | |
| if [ "$#" != "1" ]; then | |
| options="$(echo $@ | awk 'BEGIN{FS="[()]"}{print $2}')" | |
| echo "[+]$@" | |
| apply_part_rule $1 |
| #!/bin/bash | |
| #LAST UPDATE: 30/03/2020 | |
| #LAS CHANGE: added pkg-config. | |
| RED='\033[0;31m' | |
| GRN='\033[0;32m' | |
| YLL='\033[1;33m' | |
| NC='\033[0m' # No Color | |
| #FILE NAMES | |
| PTROOTDIR="pentestTools" | |
| PTDIRS="{lists,tools,shells/{klbuiltin,}}" |