With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| #!/bin/bash | |
| ###################################################################################### | |
| # | |
| # Author : Sicinthemind | |
| # Date : 8/4/2020 | |
| # Purpose : Observes DNS records for SPF and DMARC for a given domain | |
| # list of email addresses. | |
| # | |
| ###################################################################################### |
| #!/bin/bash | |
| ############################################################################# | |
| # PORT SCANNING AND SERVICE ENUMERATION TOOL BY SICINTHEMIND | |
| # Can install to /usr/bin/ and it will run anywhere, saving the files | |
| # in the current working directory. | |
| ############################################################################# | |
| regpat="^(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$" | |
| ip="" | |
| workspace="" | |
| if [ "$(id -u)" -ne 0 ]; then # check if script is running as root! |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module: