Share
## https://sploitus.com/exploit?id=PACKETSTORM:180592
##  
# This module requires Metasploit: https://metasploit.com/download  
# Current source: https://github.com/rapid7/metasploit-framework  
##  
  
require 'metasploit/framework/credential_collection'  
require 'metasploit/framework/login_scanner/kerberos'  
  
class MetasploitModule < Msf::Auxiliary  
include Msf::Exploit::Remote::Kerberos::AuthBrute  
  
def initialize(info = {})  
super(  
update_info(  
info,  
'Name' => 'Kerberos Domain User Enumeration',  
'Description' => %q{  
This module will enumerate valid Domain Users via Kerberos from an unauthenticated perspective. It utilizes  
the different responses returned by the service for valid and invalid users.  
},  
'Author' => [  
'Matt Byrne <attackdebris[at]gmail.com>', # Original Metasploit module  
'alanfoster', # Enhancements  
'sjanusz-r7' # Enhancements  
],  
'References' => [  
['URL', 'https://nmap.org/nsedoc/scripts/krb5-enum-users.html']  
],  
'License' => MSF_LICENSE  
)  
)  
  
end  
  
def run  
attempt_kerberos_logins  
end  
end