Password Spray
What is Password Spray?
Rather than the usual dictionary brute force methods involving a dictionary of hundreds if not millions of password entries, the idea of password spray is to reverse the process: introduce a list of as many users as possible, while trying just a single password attempt against tens or hundreds of user accounts.
Username Enumeration
Here is a username list example:
https://github.com/insidetrust/statistically-likely-usernames
We can enumerate usernames using SMTP VRFY
method:
This is same as the Metasploit module auxiliary/scanner/smtp/smtp_enum
.
Password Selection
Now that we have validated some users, we should determine one (recommended) or two (maximum) commonly-used passwords we can use for our attack.
Regarding commonly used passwords, real-world experience has shown that one of the most commonly used passwords are usually found to be the current season, along with the current year, e.g., Spring2022.
Another very common password is "CompanyName" along with a numerical value, e.g., FooCorp01, FooCorp02, etc.
SSH Password Spray
Spray a single server:
Spray multiple servers:
When bruteforcing SSH, always use 4 threads. This is because >= 4 threads may get caught by defense mechanism.
Last updated