kerbrute tool will give you list of valid users that are part of blackfield domain.
Now we want to see only username@domainname field. Then awk command will help.
grep Valid command will help to remove the blank lines.
We dont want to see @domain part. So -F\@ or -F@ switch will help. Now save this as only username.lst
and save this as dom_user.lst
now lets say we want to see 1st and last part of each line meaning, htb.local\andy and ntlm hash.
now we can crack this using hashcat.
Now we want to see only username@domainname field. Then awk command will help.
grep Valid command will help to remove the blank lines.
We dont want to see @domain part. So -F\@ or -F@ switch will help. Now save this as only username.lst
and save this as dom_user.lst
Another example: lets say we only want to extract Administrator username.
user: [Administrator] rid: [0x1f4]
awk -F'\[' '{print $2}'
now we will see this part Administrator] rid: [0x1f4]
awk -F'\[' '{print $2}' | awk -F'\]' '{print $1}'
Now we should see only Administrator.
now lets say we want to see 1st and last part of each line meaning, htb.local\andy and ntlm hash.
cat hashes.out | grep ::: | awk -F: '{print $1":"$4}'
the result will be like this:
now we can crack this using hashcat.
Comments
Post a Comment