🩸
Pentesting Notes
Ctrlk
  • ㊙️r3dcl1ff
    • 🔬Enumeration
      • FTP 21
      • SSH 22
      • Telnet 23 - 2323
      • SMTP 25
      • DNS 53
      • 80 http
      • 88 Kerberos
      • Pop 110-995
      • RPC 111
      • Ident 113
      • NNTP 119
      • NETBios 137-138
      • SMB-Samba 135-139 445
      • MSRPC 135
      • SNMP 161
      • LDAP - 389,636
      • Modbus 502
      • OpenSSL 1337
      • Ms-SQL 1433
      • Oracle Listener 1521 1522 1529
      • NFS 2049
      • MySql 3306
      • RDP 3389
      • ADB Android Debug Bridge 5555
      • WinRM 5985 5986
      • VNC 5800 5900
      • Redis 6379
      • Unreal IRC 6667
      • Tomcat 8080
      • MongoDB 27017
      • Webapp Enum Methodology
      • IIS
    • 🧨Exploitation (deprecated node)
    • 🈲Privesc
    • 🖥️CLI-Fu
    • 🎯OSINT
    • 🛠️Tools
    • 🟦Active Directory
    • 🪓Sysadmin
    • 🗒️Pentesting Checklist(s)
    • 🕷️WebApp Pentest
    • 🌩️Cloud
    • 🧠Threat Intel
    • 📟IoT / IIoT
    • 🏭ICS/OT - SCADA
    • 🩻Private Templates
    • 🐞BBP
    • 📱Mobile
  • Daily Syncs
    • Design Standups
  • Weekly Syncs
    • Company Weeklies
  • Other Regulars
    • Company Weeklies
Powered by GitBook
On this page
  1. ㊙️r3dcl1ff
  2. 🔬Enumeration

88 Kerberos

LogoKerberos (II): How to attack Kerberos?Tarlogic Security
How To Attack Kerberos 101m0chan Blog - Info Sec, CTF & Hacking

#Assorted commands

PreviousvBulletin <= 5.6.9: Pre-authentication Remote Code ExecutionNextPop 110-995

Last updated 1 year ago

#anonymous user enum leveraging Kerberos
nmap -p 88 --script=krb5-enum-users --script-args krb5-enum-users.realm='VICTIM.local' <DC IP> -Pn