Harutomo Hacking Notes
Ctrlk
  • Welcome
  • Microsoft Windows
    • Windows OS
    • Active Directory (AD)
      • General Information
        • Active Directory - Certificate Services
        • Active Directory - Authentication Methods
          • Cached AD Credentials
          • Password Attacks / Brute Force
            • Password Spraying Kerberos Authentication
          • Kerberoasting
          • AS-REP Roasting
          • Silver Tickets
          • Domain Controller Synchronization
          • Kerberos Ticket Authentication
      • Initial Access
      • Recon
      • Tools
      • Techniques
      • Legacy Notes
    • PowerShell Tricks
    • Evil-WinRM
  • Linux OS
    • Linux File System
    • Privilege Escalation
    • SSH Tricks
  • Post Exploitation
    • File Transferring
    • Crack NTLM Hashes
  • Web Application Attacks
    • SQL Injection
    • OWASP Top 10 (2021)
  • Methodologies & Resources
    • Note Taking & Reporting For OSCP
    • Brute Force Attacks
    • Tricks from IppSec
    • Tunneling and Port Forwarding
    • Metasploit Framework
    • Feroxbuster
    • Upgrading Revshells
    • Tricks from Burmat Gitbook
    • Creating Username Lists with Username Anarchy
    • Certificate Files (PFX, PUB, PEM)
  • Network Services
    • 21 - FTP
    • 53 - DNS Pentesting
    • 80,443 - Web Pentesting
    • 88 Kerberos
    • 139, 445 - SMB
    • 389, 636, 3268, 3269 - LDAP
    • 1433 - MSSQL - Microsoft SQL Server
    • 5985, 5986 - WinRM
  • CLOUD SERVICES
    • Microsoft Azure
  • Malware
    • Yara Rules
Powered by GitBook
On this page
  1. Microsoft Windows
  2. Active Directory (AD)
  3. General Information
  4. Active Directory - Authentication Methods
  5. Password Attacks / Brute Force

Password Spraying Kerberos Authentication

Kerbrute

LogoGitHub - ropnop/kerbrute: A tool to perform Kerberos pre-auth bruteforcingGitHub

Enumerate Valid Usernames

Password Spray with Valid Usernames

Crackmapexec

PreviousPassword Attacks / Brute ForceNextKerberoasting

Last updated 11 months ago

  • Kerbrute
  • Enumerate Valid Usernames
  • Password Spray with Valid Usernames
  • Crackmapexec
kerbrute userenum -d domain.example --dc dc.domain.example users.txt
kerbrute pass --dc dc.domain.example -d domain.example pass.txt users.txt