← All talks

Password Spraying: EASILY Find Account Vulnerabilities NOW! #shorts

BSides Frankfurt1:56632 viewsPublished 2026-03Watch on YouTube ↗
About this talk
See how a simple password spray attack works against domain accounts. A tool from Black Hills Information Security demonstrates failed login attempts, showcasing vulnerability without needing successful breaches. #PasswordSpray #CyberSecurity #InfoSec #DomainSecurity #BHIS
Show transcript [en]

We have all of our accounts created. I'm going to clear my screen. We're going to fire up some PowerShell and we're going to use a tool uh that we created at Black Hills Information Security. This is by Daft Hacked or Bullbolic. And um going to set the execution policy unrestricted. I don't think that came through. We go. All right. Then what we're going to do is import the modules for this tool. And this is a common tool. We use this all the time at Black Hills Information Security. We see it being used by malicious attackers or variations of it called domain password spray in the wild. And we're going to fire it up with a password of winter 2020. Now, this is

going to try to authenticate to every single excuse me, every single one of the accounts on this system with a password of winter 2020. Now, you're going to see it get into like five or six accounts here, but it's not going to get into Frank's account. Um, and I really want to stress that it doesn't have to successfully log into Frank's account. It just has to attempt to log in to Frank's account. And because it attempted to log in to Frank's account, if we go back to Windows event viewer, you will see if I refresh, I think two or three new event logs where somebody failed to log in to the Frank account. Once again,

does this seem hard? No. This isn't difficult at all. This is super easy to do. It doesn't cost you anything. I will warn you, there are vendors that'll charge you hundreds of thousands of dollars to do this for you. Um, you don't need to spend that money. like set up a Honey share, set up a Honey user,