5. Kerberos Username Enumeration
You're now moving into Kerberos username enumeration using kerbrute.
π You already have:
Domain name: megachange.nyx β
DC IP: 192.168.10.4 β
π What is it?
Youβre trying to find valid usernames in a Windows domain using the Kerberos protocol β without needing a password.
This is helpful for:
AS-REP Roasting
Kerberoasting
Password spray/brute-force attacks
π§° Tool: kerbrute
kerbrute
It asks the Domain Controller (DC): "Hey, does this username exist?"
If the DC replies in a certain way, that means the username is valid β without triggering account lockout π«π
π₯οΈ Example Command:
π What each part means:
./kerbrute
β runs the tool (assuming you're in the same folder)userenum
β tells it to do username enumeration--dc 192.168.10.4
β IP of the Domain Controller-d megachange.nyx
β the Domain Name (from LDAP)/path/to/userlist.txt
β a list of usernames to try
π Output:
kerbrute will show the valid username:
β
Summary in 1 Line:
You use
kerbrute
to check which usernames exist in a Windows domain by asking the Kerberos service, without needing any password.
Last updated