With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| using System; | |
| using System.Reflection; | |
| using System.Runtime.InteropServices; | |
| using System.Linq; | |
| namespace NautilusProject | |
| { | |
| internal class CombinedExec | |
| { | |
| public static IntPtr AllocMemory(int length) |
| function Get-Exports { | |
| <# | |
| .SYNOPSIS | |
| Get-Exports, fetches DLL exports and optionally provides | |
| C++ wrapper output (idential to ExportsToC++ but without | |
| needing VS and a compiled binary). To do this it reads DLL | |
| bytes into memory and then parses them (no LoadLibraryEx). | |
| Because of this you can parse x32/x64 DLL's regardless of | |
| the bitness of PowerShell. |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| #!/bin/bash | |
| # https://cloud.google.com/compute/docs/faq#find_ip_range | |
| # nslookup -q=TXT _cloud-netblocks.googleusercontent.com 8.8.8.8 | |
| myarray=() | |
| for LINE in `dig txt _cloud-netblocks.googleusercontent.com +short | tr " " "\n" | grep include | cut -f 2 -d :` | |
| do | |
| myarray+=($LINE) | |
| for LINE2 in `dig txt $LINE +short | tr " " "\n" | grep include | cut -f 2 -d :` |