Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/xfreed0m/rdpassspray

Python3 tool to perform password spraying using RDP
https://github.com/xfreed0m/rdpassspray

password-spray passwordspraying pentest-tool pentesting rdp stealth

Last synced: 11 days ago
JSON representation

Python3 tool to perform password spraying using RDP

Awesome Lists containing this project

README

        

# RDPassSpray

RDPassSpary is a python tool to perform password spray attack in a Microsoft domain environment.
ALWAYS VERIFY THE LOCKOUT POLICY TO PREVENT LOCKING USERS.

## How to use it
First, install the needed dependencies:
```
pip3 install -r requirements.txt
```
Second, make sure you have xfreerdp:
```
apt-get install python-apt
apt-get install xfreerdp
````
Last, run the tool with the needed flags:
```
python3 RDPassSpray.py -u [USERNAME] -p [PASSWORD] -d [DOMAIN] -t [TARGET IP]
```

## Options to consider
* -p\\-P
* single password/hash or file with passwords/hashes (one each line)
* -t\\-T
* single target or file with targets (one each line)
* -u\\-U
* single username or file with usernames (one each line)
* --pth
* specify this if the supplied passwords are to be treated as hashes for Pass-The-Hash
* -n
* list of hostname to use when authenticating (more details below)
* -o
* output file name (csv)
* -s
* throttling time (in seconds) between attempts
* -r
* random throttling time between attempts (based on user input for min and max values)

## Advantages for this technique
Failed authentication attempts will produce event ID 4625 ("An account failed to log on") BUT:
* the event won't have the source ip of the attacking machine:
![No source IP](https://github.com/xFreed0m/RDPassSpray/blob/master/no_src_ip.png)
* The event will record the hostname provided to the tool:
![Fake hostname](https://github.com/xFreed0m/RDPassSpray/raw/master/fake_hostname.png)

### Tested OS
Currently was test on Kali Rolling against Windows Server 2012 Domain Controller
I didn't had a full logged environment for deeper testing, if you have one, please let me know how it looks on other systems.

### Sample
![sample](https://github.com/xFreed0m/RDPassSpray/blob/master/sample.png)

### Credit
This tools is based on the POC made by @dafthack - https://github.com/dafthack/RDPSpray

### Issues, bugs and other code-issues
Yeah, I know, this code isn't the best. I'm fine with it as I'm not a developer and this is part of my learning process.
If there is an option to do some of it better, please, let me know.

_Not how many, but where._