RDPassSpary is a python tool to perform password spray attack in a Microsoft domain environment. ALWAYS VERIFY THE LOCKOUT POLICY TO PREVENT LOCKING USERS.
First, install the needed dependencies:
pip3 install -r requirements.txt
Second, make sure you have xfreerdp:
apt-get install python-apt
apt-get install xfreerdp
Last, run the tool with the needed flags:
python3 RDPassSpray.py -u [USERNAME] -p [PASSWORD] -d [DOMAIN] -t [TARGET IP]
- -p\-P
- single password or file with passwords (one each line)
- -t\-T
- single target or file with targets (one each line)
- -u\-U
- single username or file with usernames (one each line)
- -n
- list of hostname to use when authenticating (more details below)
- -o
- output file name (csv)
- -s
- throttling time (in seconds) between attempts
- -r
- random throttling time between attempts (based on user input for min and max values)
Failed authentication attempts will produce event ID 4625 ("An account failed to log on") BUT:
- the event won't have the source ip of the attacking machine:
- The event will record the hostname provided to the tool:
Currently was test on Kali Rolling against Windows Server 2012 Domain Controller I didn't had a full logged environment for deeper testing, if you have one, please let me know how it looks on other systems.
This tools is based on the POC made by @dafthack - https://github.com/dafthack/RDPSpray
Yeah, I know, this code isn't the best. I'm fine with it as I'm not a developer and this is part of my learning process. If there is an option to do some of it better, please, let me know.
Not how many, but where.