Kerberos Brute Force (Invoke-RubeusBrute)

Description

Performs Kerberos-based password brute forcing against domain accounts.

Overview

Performs Kerberos-based password brute forcing by sending AS-REQ messages to the KDC. This method is stealthier than traditional brute forcing as it does not generate Windows logon events (4625) for failed attempts. Supports single or multiple users and passwords.

Only successful credential matches produce output. Failed attempts are silent by design.

Parameter Sets

SingleUserSinglePass

Parameter Type Required Description
User string Yes A single username to brute force.
Password string Yes A single password to try.
Domain string Yes The target domain.
DC string No The domain controller to target.

SingleUserPassFile

Parameter Type Required Description
User string Yes A single username to brute force.
Passwords string Yes Path to a file containing passwords (one per line).
Domain string Yes The target domain.
DC string No The domain controller to target.

UserFileSinglePass

Parameter Type Required Description
Users string Yes Path to a file containing usernames (one per line).
Password string Yes A single password to try.
Domain string Yes The target domain.
DC string No The domain controller to target.

UserFilePassFile

Parameter Type Required Description
Users string Yes Path to a file containing usernames (one per line).
Passwords string Yes Path to a file containing passwords (one per line).
Domain string Yes The target domain.
DC string No The domain controller to target.

Dependencies

  • AD

Operating Systems

  • Windows
Scroll to Top