Can skip this part if you know for sure there is no account lockout policy
Linux Attacker#
netexec#
If null session is available, use this
netexec smb -u '' -p '' $target --pass-polIf not, then need valid credential
netexec smb $target -u "$user" -p "$pass" --pass-polrpcclient#
If null session is available, use this
rpcclient -U "" -N $target
rpcclient $> getdompwinfoIf not, then need valid credential
rpcclient -U "$user%$pass" $target
rpcclient $> getdompwinfoldapsearch#
ldapsearch -h $target -x -b "DC=INLANEFREIGHT,DC=LOCAL" -s sub "*" | grep -m 1 -B 10 pwdHistoryLengthDomain joined Windows#
net.exe#
net accountsPowerview#
import-module .\PowerView.ps1Get-DomainPolicy