Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/qeeqbox/password-spraying
A threat actor may guess the target credentials using a single password with a large set of usernames against the target
https://github.com/qeeqbox/password-spraying
example infosecsimplified metadata password qeeqbox spraying visualization vulnerability
Last synced: 2 days ago
JSON representation
A threat actor may guess the target credentials using a single password with a large set of usernames against the target
- Host: GitHub
- URL: https://github.com/qeeqbox/password-spraying
- Owner: qeeqbox
- License: agpl-3.0
- Created: 2022-04-20T23:24:34.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2024-01-29T01:07:23.000Z (10 months ago)
- Last Synced: 2024-05-01T11:27:24.463Z (7 months ago)
- Topics: example, infosecsimplified, metadata, password, qeeqbox, spraying, visualization, vulnerability
- Homepage:
- Size: 201 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
A threat actor may guess the target credentials using a single password with a large set of usernames against the target
## Example #1
1. Threat actor finds a commonly used passwords
2. Threat actor utilizes the passwords with a list of usernames## Impact
Vary## Risk
- Gain unauthorized access## Redemption
- Increase the password length
- Increase password complexity
- Limit login attempts
- Implement captcha
- Multi-factor authentication## ID
8456e95b-dae6-44ff-bb2b-75a37e16c0c7## References
- [wiki](https://en.wikipedia.org/wiki/brute-force_attack/)