Active Directory Password Spraying
This lab explores ways of password spraying against Active Directory accounts.
Invoke-DomainSpray
Get-ADUser -Properties name -Filter * | Select-Object -ExpandProperty name | Out-File users.txt
type users.txt

Spraying using dsacls
While I was poking around with dsacls for enumerating AD object permissions
Enumerating AD Object Permissions with dsaclsI noticed that one could attempt to bind to LDAP using specific AD credentials, so a dirty AD password spraying POC came about:

Spraying with Start-Process
Similarly to dsacls, it's possible to spray passwords with Start-Process cmdlet and the help of PowerView's cmdlets:
Enjoy the shells:

References
PreviousEnumerating AD Object Permissions with dsaclsNextActive Directory Lab with Hyper-V and PowerShell
Last updated