Enumeration


>>>bloodhound-pyhton  -u  username  -p  password  -d  htb.local  -ns  $IP

Grabbing Host-name

crackmapexec smb $IP

You found Users but want to confirm 👍

Page Link : https://github.com/ropnop/kerbrute/releases/tag/v1.0.3
./kerbrute _linux_amd64 userenum --dc $IP -d <domain> users.txt

you have a password but don't know of which user 👍

./kerbrute _linux_amd64 passwordspray 	--dc $IP -d <domain>  users.txt  ‘Iampassword?’

test If your founded User can be accessed

crackmapexec smb $IP -u  username -p ‘password’

crackmapexec winrm $IP -u  username -p ‘password’

crackmapexec winrm $IP -d domain -u  username -p ‘password’

Bloodhound

Last updated