Friday, September 30, 2011

ncrack with domain creds

little post on using ncrack to brute/check domain creds

user@ubuntu:~/pentest/msf3$ ncrack,CL=2 --user=username@domain --pass=myl33tpassword -vvv -d7

Starting Ncrack 0.4ALPHA ( ) at 2011-09-29 14:48 PDT

rdp:// Account credentials are valid, however, the maximum number of terminal services connections has been reached.
Discovered credentials on rdp:// 'username@domain' 'myl33tpassword'
rdp:// (EID 1) Attempts: total 1 completed 1 supported 1 --- rate 0.90
rdp:// finished.

No comments: