Categories: Kali Linux

Spray : Password Spraying Tool For Active Directory Credentials

Spray is a Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf). These instructions will show you the requirements for and how to use it.

Prerequisites

All requirements come preinstalled on Kali Linux, to run on other flavors or Mac just make sure curl(owa & lync) and rpcclient(smb) are installed using apt-get or brew.

rpcclient
curl

Using Spray

This script will password spray a target over a period of time It requires password policy as input so accounts are not locked out

Accompanying this script are a series of hand crafted password files for multiple languages. These have been crafted from the most common active directory passwords in various languages and all fit in the complex (1 Upper, 1 lower, 1 digit) catagory.

Also Read – WiFiPumpkin3 : Powerful Framework For Rogue Access Point Attack

SMB

To password spray a SMB Portal, a userlist, password list, attempts per lockout period, lockout period length and the domain must be provided.

Usage: spray.sh -smb <targetIP><usernameList><passwordList><AttemptsPerLockoutPeriod><LockoutPeriodInMinutes><DOMAIN>
Example: spray.sh -smb 192.168.0.1 users.txt passwords.txt 1 35 SPIDERLABS
Optionally Skip Username%Username Spray: spray.sh -smb 192.168.0.1 users.txt passwords.txt 1 35 SPIDERLABS skipuu

OWA

To password spray an OWA portal, a file must be created of the POST request with the Username: sprayuser@domain.com, and Password: spraypassword

Usage: spray.sh -owa <targetIP><usernameList><passwordList><AttemptsPerLockoutPeriod><LockoutPeriodInMinutes><RequestsFile>
Example: spray.sh -owa 192.168.0.1 users.txt passwords.txt 1 35 post-request.txt

Lync

To password spray a lync service, a lync autodiscover url or a url that returns the www-authenticate header must be provided along with a list of email addresses;

Usage: spray.sh -lync <targetIP><usernameList><passwordList><AttemptsPerLockoutPeriod><LockoutPeriodInMinutes>
Example: spray.sh -lync https://lyncdiscover.spiderlabs.com/ users.txt passwords.txt 1 35
Example: spray.sh -lync https://lyncweb.spiderlabs.com/Autodiscover/AutodiscoverService.svc/root/oauth/user users.txt passwords.txt 1 35

CISCO Web VPN

To password spray a CISCO Web VPN service, a target portal or server hosting a portal must be provided

Usage: spray.sh -cisco <targetURL><usernameList><passwordList><AttemptsPerLockoutPeriod><LockoutPeriodInMinutes>
Example: spray.sh -ciso 192.168.0.1 usernames.txt passwords.txt 1 35

Password List Update

It is also possible to update the supplied 2016/2017 password list to the current year

Usage: spray.sh -passupdate <passwordList>
Example: spray.sh -passupdate passwords.txt

An optional company name can also be provided to add to the list

Usage: spray.sh -passupdate <passwordList><CompanyName>
Example: spray.sh -passupdate passwords.txt Spiderlabs

Username Generation

A username list can also be generated from a list of common names

Usage: spray.sh -genusers <firstnames> <lastnames> “<<fi><li><fn><ln>>”
Example: spray.sh -genusers english-first-1000.txt english-last-1000.txt”<fi><ln>”
Example: spray.sh -genusers english-first-1000.txt english-last-1000.txt “<fn>.<ln>”

Credit : Jacob WilkinResearch and DevelopmentTrustwave SpiderLabs

R K

Recent Posts

How to Install Java on Ubuntu 24.04 Easily in 2026

Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…

1 day ago

How to Install DEB Files on Ubuntu in 2026 (Step-by-Step Beginner Guide)

Ubuntu users often download software directly from developer websites instead of using the default app…

1 day ago

Things to Do After Installing Ubuntu 26.04 LTS for a Fast, Secure Setup

Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…

4 days ago

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 month ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 months ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 months ago