Password Spraying Attack

From GM-RKB
Jump to navigation Jump to search

A Password Spraying Attack is a brute-force password attack in which a malicious actor uses a single password against targeted user accounts before moving on to attempt a second password



References

2019a

2019b

2018

  • https://doubleoctopus.com/security-wiki/threats-and-tools/password-spraying/
    • QUOTE: Password spraying is an attack that attempts to access a large number of accounts (usernames) with a few commonly used passwords. Traditional brute-force attacks attempt to gain unauthorized access to a single account by guessing the password. This can quickly result in the targeted account getting locked-out, as commonly used account-lockout policies allow for a limited number of failed attempts (typically three to five) during a set period of time. During a password-spray attack (also known as the “low-and-slow” method), the malicious actor attempts a single commonly used password (such as ‘Password1’ or ‘Summer2017’) against many accounts before moving on to attempt a second password, and so on. This technique allows the actor to remain undetected by avoiding rapid or frequent account lockouts.