With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
# Exploited PS4 Blocklist (https://gbatemp.net/threads/aio-ps4-exploit-guide.497858/) | |
#[community.playstation.net] | |
asm.np.community.playstation.net | |
ps4.updptl.np.community.playstation.net | |
ps4.updptl.sp-int.community.playstation.net | |
ps4updptl.eu.np.community.playstation.net | |
ps4updptl.jp.np.community.playstation.net | |
ps4updptl.jp.sp-int.community.playstation.net | |
ps4updptl.uk.np.community.playstation.net |
I hereby claim:
To claim this, I am signing this object:
sudo su - zimbra | |
# list all accounts and print out account name and aliases | |
for i in `zmprov -l gaa` ; do zmprov ga $i zimbraMailAlias ; done | |
# list all distribution lists and any members and/or aliases | |
for i in `zmprov gadl` ; do zmprov gdl $i zimbraMailAlias zimbraMailForwardingAddress ; done |