Path: blob/master/modules/auxiliary/scanner/kerberos/kerberos_login.rb
34434 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Auxiliary6include Msf::Exploit::Remote::Kerberos::AuthBrute78def initialize(info = {})9super(10update_info(11info,12'Name' => 'Kerberos Authentication Check Scanner',13'Description' => %q{14This module will test Kerberos logins on a range of machines and15report successful logins. If you have loaded a database plugin16and connected to a database this module will record successful17logins and hosts so you can track your access.1819Kerberos accounts which do not require pre-authentication will20have the TGT logged for offline cracking, this technique is known as AS-REP Roasting.2122It is also able to identify whether user accounts are enabled or23disabled/locked out.24},25'Author' => [26'alanfoster',27],28'References' => [29['ATT&CK', Mitre::Attack::Technique::T1110_001_PASSWORD_GUESSING],30['ATT&CK', Mitre::Attack::Technique::T1110_003_PASSWORD_SPRAYING],31['ATT&CK', Mitre::Attack::Technique::T1589_001_CREDENTIALS],32['ATT&CK', Mitre::Attack::Technique::T1087_002_DOMAIN_ACCOUNT]33],34'License' => MSF_LICENSE,35'Notes' => {36'Stability' => [CRASH_SAFE],37'Reliability' => [],38'SideEffects' => [ACCOUNT_LOCKOUTS, IOC_IN_LOGS]39}40)41)42end4344def run45attempt_kerberos_logins46end47end484950