RDPassSpary is a python tool to perform password spray attack in a Microsoft domain environment. ALWAYS VERIFY THE LOCKOUT POLICY TO PREVENT LOCKING USERS.
How to use it
First, install the needed dependencies:
pip3 install -r requirements.txt
Second, make sure you have xfreerdp:
apt-get install python-apt apt-get install xfreerdp
Last, run the tool with the needed flags:
python3 RDPassSpray.py -u [USERNAME] -p [PASSWORD] -d [DOMAIN] -t [TARGET IP]
Options to consider
- single password or file with passwords (one each line)
- single target or file with targets (one each line)
- single username or file with usernames (one each line)
- list of hostname to use when authenticating (more details below)
- output file name (csv)
- throttling time (in seconds) between attempts
- random throttling time between attempts (based on user input for min and max values)
Advantages for this technique
Failed authentication attempts will produce event ID 4625 ("An account failed to log on") BUT:
- the event won't have the source ip of the attacking machine:
- The event will record the hostname provided to the tool:
Currently was test on Kali Rolling against Windows Server 2012 Domain Controller I didn't had a full logged environment for deeper testing, if you have one, please let me know how it looks on other systems.
This tools is based on the POC made by @dafthack - https://github.com/dafthack/RDPSpray
Issues, bugs and other code-issues
Yeah, I know, this code isn't the best. I'm fine with it as I'm not a developer and this is part of my learning process. If there is an option to do some of it better, please, let me know.
Not how many, but where.