Skip to content
/ ridenum Public
forked from trustedsec/ridenum

Rid_enum is a null session RID cycle attack for brute forcing domain controllers.

License

Notifications You must be signed in to change notification settings

genba/ridenum

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

38 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

RID_ENUM - A simple open source method for performing null session brute forces

Copyright 2014 TrustedSec

Written by: David Kennedy (ReL1K) Twitter: @dave_rel1k and @TrustedSec Website: https://www.trustedsec.com

.______ __ _______ _______ .__ . __ __ ._ . | _ \ | | | \ | _|| \ | | | | | | | / | | |) | | | | .--. | | | | | | | | | | | \ / | | / | | | | | | | | | . | | | | | | |\/| | | |\ \----.| | | '--' | | |____ | |\ | | --' | | | | | | _| `.||| |/ _____|||| _| _/ || || |____|

Rid Enum is a RID cycling attack that attempts to enumerate user accounts through null sessions and the SID to RID enum. If you specify a password file, it will automatically attempt to guess the user accounts when its finished enumerating.

  • RID_ENUM is open source and uses all standard python libraries minus python-pexpect. -

Example: ./rid_enum.py 192.168.1.50 500 50000 /root/dict.txt

Usage: ./rid_enum.py <server_ip> <start_rid> <end_rid> <optional_password_file>

About

Rid_enum is a null session RID cycle attack for brute forcing domain controllers.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published