Password Spraying
Password spraying involves trying different combinations of acquired passwords and usernames in different network protocols. In this way, some reused credentials can be found. The best tool for this is NetExec (successor to CrackMapExec). Available protocols: smb
, ssh
, ldap
, ftp
, wmi
, winrm
, rdp
, vnc
, mssql
.
NOTE:
Username
,password
andtarget
parameter can be provided in a form of:
- single string (e.g.
-u john.doe
)- multiple space-separated strings (e.g.
-u john.doe adam.smith
)- path to the file with items (e.g.
-u ~/usernames.txt
)Read more: NetExec official documentation.
CrackMapExec is legacy tooling but still very popular. It works mostly the same:
Using smb
protocol it's worth to check possibility of RCE via one of the following methods: wmiexec
, atexec
, smbexec
. Using -X <cmd>
parameter CrackMapExec on success automatically tries to execute the command using the above methods (all are based on access to SMB shares):
Hydra
is a versatile tool to perform online password attacks. It's able to crack usernames and passwords to many different services: ftp
, smtp
, ssh
, http
.
Local Administrator's password reuse
The password for the local Administrator
account is very often reused and is therefore the same on multiple machines within the domain. It's quite often to see one system image that is used for all machines. It is always a good idea to check if the Administrator user password is reused across the domain.