Active Directory Password Spraying

This lab explores ways of password spraying against Active Directory accounts.

Invoke-DomainSpray

attacker@victim
Get-ADUser -Properties name -Filter * | Select-Object -ExpandProperty name |  Out-File users.txt
type users.txt

Spraying using dsacls

While I was poking around with dsacls for enumerating AD object permissions

Enumerating AD Object Permissions with dsacls

I noticed that one could attempt to bind to LDAP using specific AD credentials, so a dirty AD password spraying POC came about:

Spraying with Start-Process

Similarly to dsacls, it's possible to spray passwords with Start-Process cmdlet and the help of PowerView's cmdlets:

Enjoy the shells:

References

Last updated