π₯Password Spraying - Target User Lists
π Overview
π― Why User Enumeration Matters
π Attack Prerequisites
β οΈ Critical Considerations
π SMB NULL Session Enumeration
π enum4linux - User Enumeration
π§ rpcclient - User Enumeration
β‘ CrackMapExec - Enhanced User Info
π LDAP Anonymous Bind Enumeration
π ldapsearch - LDAP Queries
πͺ windapsearch - User-Friendly LDAP
π« Kerbrute User Enumeration
β‘ Kerberos Pre-Authentication Method
Key Advantages:
How It Works:
π Kerbrute Commands
π Example Kerbrute Output
π Performance Metrics
π Credentialed User Enumeration
β‘ CrackMapExec with Valid Credentials
π Username List Sources
π― External Intelligence Gathering
LinkedIn Username Generation
Email Harvesting
Statistical Username Lists
π Username Format Patterns
π Enumeration Method Comparison
π― HTB Academy Lab Walkthrough
π Lab Question
π Step-by-Step Solution
1οΈβ£ Connect to Attack Host
2οΈβ£ Verify Wordlist
3οΈβ£ Find Domain Controller
4οΈβ£ Run Kerbrute User Enumeration
5οΈβ£ Expected Results Analysis
β
Expected Answer: 56 valid usernames
56 valid usernames6οΈβ£ Bonus: Extract Clean Username List
π‘οΈ Security Considerations
π¨ Event ID Monitoring
π Detection Indicators
π‘οΈ Defensive Recommendations
π Attack Documentation Template
π Required Logging Fields
π― User List Management
β‘ Quick Reference Commands
π Unauthenticated Methods
π Credentialed Methods
π Key Takeaways
β
Enumeration Best Practices
β οΈ Critical Warnings
π― Next Steps After User Enumeration
Last updated