🦁Kerbrute

Introduction

A tool to perform fast brute force attacks and enumerate valid Active Directory accounts through Kerberos pre-authentication.

Installation and Usage Guide

Clone the GitHub repository:

Detailed guide available through the following blog:

sudo ntpdate -s 10.10.10.10

User Enumeration

# Brute force to enumerate users
kerbrute userenum --dc 10.10.10.10 -d domain.htb /usr/share/seclists/Usernames/xato-net-10-million-usernames.txt

Password Spraying and Brute Force

Password Spraying

Brute Force Attacks

Key Parameters

  • --dc: Specify the Domain Controller IP address

  • -d: Target domain name

  • userenum: Enumerate valid usernames

  • passwordspray: Test one password against multiple users

  • bruteforce: Test multiple username:password combinations

  • bruteuser: Test multiple passwords against one user

Tips and Best Practices

  • Always synchronize time with the Domain Controller before starting

  • Use comprehensive username lists for enumeration

  • Be mindful of account lockout policies when performing brute force attacks

  • Consider using delay options to avoid detection

  • Monitor for failed authentication logs on the target system

Last updated