Password Spray Attack
Password spray attacks use one password against multiple users, usually gathered in a users wordlist.
They are also preferred from brute-force attacks due to prevention of account lockouts.
TIP: The builtin Administrator account (RID:500) cannot be locked out of the system no matter how many failed logon attempts it accumulates.
Tools: hydra, RDPassSpray.py, MailSniper, SprayingToolkit, Metasploit (auxiliary/scanner/smb/smb_login) example
Most of the time the best passwords to spray are :
Spray a pre-generated passwords list
1) Using crackmapexec and mp64 to generate passwords and spray them against SMB services on the network.
2) Using DomainPasswordSpray to spray a password against all users of a domain https://github.com/dafthack/DomainPasswordSpray
3) SMBAutoBrute https://github.com/Shellntel/scripts/blob/master/Invoke-SMBAutoBrute.ps1
Spray passwords against the RDP service
1) Using RDPassSpray to target RDP services https://github.com/xFreed0m/RDPassSpray
2) Hydra
3) ncrack
BadPwdCount Attribute
The number of times the user tried to log on to the account using an incorrect password. A value of 0 indicates that the value is unknown.
Last updated