πͺPassword Spraying from Windows
π Overview
π― Attack Scenarios
π’ Common Windows Attack Contexts
β‘ Key Advantages from Windows
π§ DomainPasswordSpray.ps1
π Tool Overview
βοΈ Key Features
π Basic Usage (Domain-Joined)
π Example Execution Output
π§ Advanced DomainPasswordSpray Usage
π Command Parameters
π― Multiple Password Spraying
π Custom User List (Non-Domain Context)
π‘οΈ Safety Features
π― HTB Academy Lab Walkthrough
π Lab Question
π Step-by-Step Solution
1οΈβ£ Connect to Target Windows Host
2οΈβ£ Access PowerShell as Administrator
3οΈβ£ Import DomainPasswordSpray Module
4οΈβ£ Execute Password Spray with Winter2022
5οΈβ£ Expected Output Analysis
6οΈβ£ Check Results File
7οΈβ£ Alternative: Kerbrute from Windows
β
Expected Answer Format
π οΈ Alternative Windows Tools
π« Kerbrute on Windows
π¨ Native PowerShell Spraying
π‘οΈ Mitigations
π Multi-Factor Authentication (MFA)
πͺ Access Restrictions
π― Reducing Impact of Successful Exploitation
π Password Hygiene
βοΈ Lockout Policy Considerations
π Detection
π Key Event IDs to Monitor
π¨ Event ID 4625: Account Failed to Log On
π« Event ID 4771: Kerberos Pre-authentication Failed
π Detection Rules and Queries
π SIEM Query Examples
π¨ Alert Thresholds
π΅οΈ Behavioral Analytics
π External Password Spraying Targets
π Common External Targets
π― External Spraying Considerations
π Complete Lab Solution Script
π Automated Lab Solution
β‘ Quick Reference Commands
π§ Essential Commands
π Verification Commands
π Key Takeaways
β
Windows Spraying Advantages
β οΈ Critical Considerations
π― Post-Success Actions
Last updated