From the course: Advanced Pen Testing Techniques for Active Directory
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Kerberos brute-forcing attacks - Active Directory Tutorial
From the course: Advanced Pen Testing Techniques for Active Directory
Kerberos brute-forcing attacks
- [Tutor] Kerbrute is a tool we can use for bruteforce enumeration. It has four main commands. Bruteforce, which attempts to find a user password, with a known user account. Bruteuser, which attempts to validate username and password combinations. Userenum, which attempts to find valid user account names. And Passwordspray, which will attempt to validate a specific password, for a set of user accounts. We've downloaded this, so let's start by doing an unauthenticated enumeration of active directory. We need to give Kerbrute to file a potential user account names. When we're doing this, it's useful to have some knowledge of the naming conventions. For example, knowing the user ID format is an initial and the first five characters of the surname, followed by two numerics. Can be useful in creating the dictionary. If we can also get a business internal directory, we have a great start point, for identifying valid…
Contents
-
-
-
-
Set up for testing4m 19s
-
(Locked)
Extract the AD hashes4m 29s
-
(Locked)
Password spraying Active Directory2m 30s
-
(Locked)
Kerberos brute-forcing attacks2m 56s
-
(Locked)
Use CrackMapExec to access and enumerate AD2m 41s
-
(Locked)
Investigate the SYSVOL share2m 51s
-
(Locked)
Take advantage of legacy data1m 56s
-
-
-