With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| %windir%\system32\WerFaultSecure.exe | |
| %windir%\system32\mrt.exe | |
| %windir%\system32\svchost.exe | |
| %windir%\system32\NETSTAT.EXE | |
| %windir%\system32\wbem\WmiPrvSE.exe | |
| %windir%\system32\DriverStore\FileRepository\*\NVWMI\nvWmi64.exe | |
| %programfiles(x86)%\Microsoft Intune Management Extension\ClientHealthEval.exe | |
| %programfiles(x86)%\Microsoft Intune Management Extension\SensorLogonTask.exe | |
| %programfiles(x86)%\Microsoft Intune Management Extension\Microsoft.Management.Services.IntuneWindowsAgent.exe | |
| %programdata%\Microsoft\Windows Defender Advanced Threat Protection\DataCollection\*\OpenHandleCollector.exe |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module: