Enumerating users (No credentials)
Seeking for a foothold heh?
Last updated
Seeking for a foothold heh?
Last updated
A tool to quickly bruteforce and enumerate valid Active Directory accounts through Kerberos Pre-Authentication.
AS-REP roasting is an attack against Kerberos for user that don't require preauthentication During preauthentication, a user will enter their password which will be used to encrypt a timestamp and then the domain controller will attempt to decrypt it and validate that the right password was used and that it is not replaying a previous request. From there, the TGT will be issued for the user to use for future authentication. If preauthentication is disabled, an attacker could request authentication data for any user and the DC would return an encrypted TGT that can be brute-forced offline.
First list all shares:
Connect to share:
Windows Active Directory enumeration tool for Linux, written in Python. Can be used to quickly enumerate popular services on a Windows Domain Controller.