Ridenum v-1.5.4 is a null session RID cycle attack for brute forcing domain controllers.

Ridenum v-1.5.4 is a null session RID cycle attack for brute forcing domain controllers.

~~~~~~~~~~~~~~~~~~~
Changelog version 1.5.4:
~~~~~~~~~~~~~~~~~~~
* added write out if guess is correct but account disabled
* put automatic success results in instead of waiting until having to complete

Rid Enum is a RID cycling attack that attempts to enumerate user accounts through null sessions and the SID to RID enum. If you specify a password file, it will automatically attempt to brute force the user accounts when its finished enumerating.

Ridenum is a null session RID cycle attack for brute forcing domain controllers.

Ridenum is a null session RID cycle attack for brute forcing domain controllers.

– RID_ENUM is open source and uses all standard python libraries minus python-pexpect. –
You can also specify an already dumped username file, it needs to be in the DOMAINNAME\USERNAME format.

Download : ridenum.zip(8.16 KB) | Clone Url  | Our post Before
Source: https://github.com/trustedsec