🩸
Pentesting Notes
search
Ctrlk
  • ㊙️r3dcl1ffchevron-right
    • 🔬Enumerationchevron-right
      • FTP 21
      • SSH 22
      • Telnet 23 - 2323
      • SMTP 25
      • DNS 53
      • 80 httpchevron-right
      • 88 Kerberos
      • Pop 110-995
      • RPC 111
      • Ident 113
      • NNTP 119
      • NETBios 137-138
      • SMB-Samba 135-139 445
      • MSRPC 135
      • SNMP 161
      • LDAP - 389,636
      • Modbus 502
      • OpenSSL 1337
      • Ms-SQL 1433
      • Oracle Listener 1521 1522 1529
      • NFS 2049
      • MySql 3306
      • RDP 3389
      • ADB Android Debug Bridge 5555
      • WinRM 5985 5986
      • VNC 5800 5900
      • Redis 6379
      • Unreal IRC 6667
      • Tomcat 8080
      • MongoDB 27017
      • Webapp Enum Methodology
      • IIS
    • 🧨Exploitation (deprecated node)chevron-right
    • 🈲Privescchevron-right
    • 🖥️CLI-Fuchevron-right
    • 🎯OSINTchevron-right
    • 🛠️Toolschevron-right
    • 🟦Active Directorychevron-right
    • 🪓Sysadminchevron-right
    • 🗒️Pentesting Checklist(s)chevron-right
    • 🕷️WebApp Pentestchevron-right
    • 🌩️Cloudchevron-right
    • 🧠Threat Intelchevron-right
    • 📟IoT / IIoTchevron-right
    • 🏭ICS/OT - SCADAchevron-right
    • 🩻Private Templateschevron-right
    • 🐞BBP
    • 📱Mobilechevron-right
  • Daily Syncs
    • Design Standupschevron-right
  • Weekly Syncs
    • Company Weeklieschevron-right
  • Other Regulars
    • Company Weeklieschevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. ㊙️r3dcl1ffchevron-right
  2. 🔬Enumeration

88 Kerberos

LogoKerberos (II): How to attack Kerberos?Tarlogic Securitychevron-right
How To Attack Kerberos 101m0chan Blog - Info Sec, CTF & Hackingchevron-right

#Assorted commands

PreviousvBulletin <= 5.6.9: Pre-authentication Remote Code Executionchevron-leftNextPop 110-995chevron-right

Last updated 1 year ago

#anonymous user enum leveraging Kerberos
nmap -p 88 --script=krb5-enum-users --script-args krb5-enum-users.realm='VICTIM.local' <DC IP> -Pn