Skip to content

LukeLauterbach/DuoSpray

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

Duo Spraying

View Demo · Report Bug · Request Feature

Table of Contents
  1. About The Project
  2. Getting Started
  3. Usage

About The Project

This script will automatically run through a list of Google searches, in order to automate Google Dorks for pen testing engagements.

Script Screenshot

Built With

(back to top)

Getting Started

Password spraying is an integral part of penetration testing. DUO's cloud-based SSO solution is growing increasingly popular, but few solutions exist for testing organizations using DUO SSO. This solution will perform a password spraying attack against a DUO SSO protal.

If DUO SSO is used as the identity provider for M365, the script will automatically pull the organization's SSO URL. Otherwise, a DUO SSO URL can be manually specified.

Installation

  1. Clone the repo
    git clone https://github.com/LukeLauterbach/Google-Dorking-Automation.git
  2. Install the dependencies
    git install -r requirements.txt

(back to top)

Usage

python3 duospray.py [OPTIONAL ARGUMENTS] 

The script will look for files in the current directory named userlist.txt and passwords.txt. Alternatively, files can be specified using -u and -p.

Options

Option Description
-u Username File (Defaults to userlist.txt in The Current Directory)
-p Password File (Defaults to passwords.txt in The Current Directory)
-U Duo URL (Defaults to Grabbing URL from M365)
-d Delay Between Unique Passwords
-dr Delay Between Individual Password Attempts (For Added Stealth)
-db Debug Mode

(back to top)

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages