With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| #!/bin/bash | |
| ##### (Cosmetic) Colour output | |
| RED="\033[01;31m" # Issues/Errors | |
| GREEN="\033[01;32m" # Success | |
| YELLOW="\033[01;33m" # Warnings/Information | |
| BLUE="\033[01;34m" # Heading | |
| BOLD="\033[01;01m" # Highlight | |
| RESET="\033[00m" # Normal | |
| echo -e "${GREEN}" | |
| ##################################installation starts ###################################### |
| Retrieves all of the trust relationships for this domain - Does not Grab Forest Trusts | |
| ([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).GetAllTrustRelationships() | |
| Grab Forest Trusts. | |
| ([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).GetAllTrustRelationships() | |
| #!/bin/bash | |
| ##### (Cosmetic) Colour output | |
| RED="\033[01;31m" # Issues/Errors | |
| GREEN="\033[01;32m" # Success | |
| YELLOW="\033[01;33m" # Warnings/Information | |
| BLUE="\033[01;34m" # Heading | |
| BOLD="\033[01;01m" # Highlight | |
| RESET="\033[00m" # Normal |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| # SECUREAUTH LABS. Copyright 2018 SecureAuth Corporation. All rights reserved. | |
| # | |
| # This software is provided under a slightly modified version | |
| # of the Apache Software License. See the accompanying LICENSE file | |
| # for more information. | |
| # | |
| # Description: Performs various techniques to dump hashes from the | |
| # remote machine without executing any agent there. | |
| # For SAM and LSA Secrets (including cached creds) | |
| # we try to read as much as we can from the registry |
| #!/bin/bash | |
| ############################################################################################################ | |
| # ---------------------------------------------------------------------- | |
| # ASN/IPv4/Prefix lookup tool. Uses Team Cymru's whois service for data. | |
| # ---------------------------------------------------------------------- | |
| # example usage: | |
| # asn <ASnumber> -- to lookup matching ASN data. Supports "as123" and "123" formats (case insensitive) | |
| # asn <IP.AD.DR.ESS> -- to lookup matching route and ASN data | |
| # asn <ROUTE> -- to lookup matching ASN data |
| OSCP Prep class | |
| Day 1: Exploit Research | |
| http://www.securitytube.net/groups?operation=view&groupId=7 | |
| Day 2: Python Hacking | |
| https://www.youtube.com/playlist?list=PLEA1FEF17E1E5C0DA (videos 1-10 if you are a complete beginner) | |
| https://www.youtube.com/playlist?list=PL1A2CSdiySGLtKwqBnqj9BON6QQjWkP4n (entire playlist) | |