Multithreaded spraying of a password on all accounts of a domain.
- Multithreaded spraying of passwords on multiple accounts
- Export of the results
# Sprayer -h
Sprayer v0.9.1 - by @podalirius_
usage: Sprayer [-h] [-v] -sp SPRAY_PASSWORD [-oH OUTPUT_HASHES] [-T THREADS] [-P PORT] [-u USERNAME] [-p PASSWORD]
[-d DOMAIN] [--hashes [LMHASH]:NTHASH] [--no-pass] [--dc-ip ip address]
Multithreaded spraying of a password on all accounts of a domain
options:
-h, --help show this help message and exit
-v, --verbose Verbose mode. (default: False)
-sp SPRAY_PASSWORD, --spray-password SPRAY_PASSWORD
arg1 help message
-oH OUTPUT_HASHES, --output-hashes OUTPUT_HASHES
Output hashes to file
-T THREADS, --threads THREADS
Number of threads (default: 16)
-P PORT, --port PORT SMB port to connect to (default: 445)
Credentials:
-u USERNAME, --username USERNAME
Username to authenticate to the remote machine.
-p PASSWORD, --password PASSWORD
Password to authenticate to the remote machine. (if omitted, it will be asked unless -no-
pass is specified)
-d DOMAIN, --domain DOMAIN
Windows domain name to authenticate to the machine.
--hashes [LMHASH]:NTHASH
NT/LM hashes (LM hash can be empty)
--no-pass Don't ask for password (useful for -k)
--dc-ip ip address IP Address of the domain controller. If omitted it will use the domain part (FQDN)
specified in the target parameter
./Sprayer.py -u 'Administrator' -p 'Admin123!' -d 'COERCE.local' --dc-ip 192.168.1.46 -sp 'Admin123!'