Copyright 2014 TrustedSec
Written by: David Kennedy (ReL1K) Twitter: @dave_rel1k and @TrustedSec Website: https://www.trustedsec.com
.______ __ _______ _______ .__ . __ __ ._ .
| _ \ | | | \ | _|| \ | | | | | | | / |
| |) | | | | .--. | | | | | | | | | | | \ / |
| / | | | | | | | | | . | | | | | | |\/| | | |\ \----.| | | '--' | | |____ | |\ | |
--' | | | | |
| _| `.||| |/ _____|||| _| _/ || ||
|____|
Rid Enum is a RID cycling attack that attempts to enumerate user accounts through null sessions and the SID to RID enum. If you specify a password file, it will automatically attempt to guess the user accounts when its finished enumerating.
- RID_ENUM is open source and uses all standard python libraries minus python-pexpect. -
Example: ./rid_enum.py 192.168.1.50 500 50000 /root/dict.txt
Usage: ./rid_enum.py <server_ip> <start_rid> <end_rid> <optional_password_file>