From 4-Password Policy, we obtained password policy.
Now with the target user list, we can attempt on password spraying.
We can gather valid domain users via:
Make sure we take password policy in to serious consideration so that we don’t get the account locked out.
SMB Null Session
enum4linux
rpcclient
CrackMapExec
LDAP Anonymous Bind
ldapserach
windapsearch
Kerbrute
We can use Kerbrute to enumerate valid AD accounts.
Kerbrute uses pre-authentication
, which is much faster and potentially stealthier way for password spraying.
Kerbrute doesn’t generate Windows event ID or logon failure.
CrackMapExec - w Creds
Moving On
Now that we have password policy and valid usernames in hand, we can move on to password spraying.