Password Spraying

Common pattern:

  • MonthYear (September2021)

  • SeasonYear (Spring2021)

  • DayDate (Wednesday1)

Cheatsheet

Using ipmo to import the .ps1 script

PS C:\> ipmo C:\Tools\MailSniper\MailSniper.ps1

Enumerate the NetBIOS name with Invoke-DomainHarvestOWA

PS C:\> Invoke-DomainHarvestOWA -ExchHostname 10.10.15.100
[*] Harvesting domain name from the server at 10.10.15.100
The domain appears to be: CYBER or cyberbotic.io

Generate potential usernames using namemash.py

root@kali:~# /opt/namemash.py names.txt >> possible-usernames.txt
root@kali:~# head -n 5 possible-usernames.txt
bobfarmer
farmerbob
bob.farmer
farmer.bob
farmerb

Enumerating usernames using Invoke-UsernameHarvestOWA

Password spraying using Invoke-PasswordSprayOWA

Retrieving the Global Address List (GAL) using Get-GlobalAddressList

Tools

  • MailSniper - Searching email in Microsoft Exchange, enumerating users and domains, gathering Global Address List (GAL) from OWA and EWS...

  • namemash.py - Creating a user name list for brute force attacks.

  • SprayingToolkit - Password spraying attacks against Lync/S4B, OWA & O365

Last updated

Was this helpful?