Skip to content

Commit 0a4a529

Browse files
committed
Minor readme adjustment + screenshot
1 parent 063bd8d commit 0a4a529

File tree

2 files changed

+3
-1
lines changed

2 files changed

+3
-1
lines changed

bruteforce-50k.png

93.7 KB
Loading

readme.MD

+3-1
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,12 @@
22

33
*Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)*
44

5-
Looks for enabled normal user accounts. No Windows audit logs generated. High speed ~ up to 10K/sec - go beyond 25K/sec with multiple servers!
5+
Looks for enabled normal user accounts. No Windows audit logs generated. High speed ~ up to 50K/sec per server - go way beyond that with multiple servers in parallel!
66

77
[![GitHub all releases](https://img.shields.io/github/downloads/lkarlslund/ldapnomnom/total)](https://github.com/lkarlslund/ldapnomnom/releases) ![GitHub Workflow Status](https://img.shields.io/github/actions/workflow/status/lkarlslund/ldapnomnom/prerelease.yml?branch=main)
88

9+
![Highspeed bruteforcing using generated usernames](bruteforce-50k.png)
10+
911
- Tries to autodetect DC from environment variables on domain joined machines or falls back to machine hostname FQDN DNS suffix
1012
- Reads usernames to test from stdin (default) or file
1113
- Outputs to stdout (default) or file

0 commit comments

Comments
 (0)