Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ Adfsbrute - A Script To Test Credentials Against Active Directory Federation Services (ADFS), Allowing Password Spraying Or Bruteforce Attacks

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Adfsbrute - A Script To Test Credentials Against Active Directory Federation Services (ADFS), Allowing Password Spraying Or Bruteforce Attacks


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


A script to test credentials against Active Directory Federation Services (ADFS), calculating the ADFS url of an organization and allowing password spraying or bruteforce attacks.

The main idea is carrying out password spraying attacks with a random and high delay between each test and using a list of proxies or Tor to make the detection by the Blue Team more difficult. Brute force attacks are also possible, or testing credentials with the format username:password (for example from Pwndb). Tested logins will get stored in a log file to avoid testing them twice.


Usage
./adfsbrute.py -t TARGET [-u USER] [-U USER_LIST] [-p PASSWORD] [-P PASSWORD_LIST] [-UL userpassword_list]
[-m MIN_TIME] [-M MAX_TIME] [-tp TOR_PASSWORD] [-pl PROXY_LIST] [-n NUMBER_OF_REQUESTS_PER_IP]
[-s STOP_ON_SUCCESS] [-r RANDOM_COMBINATIONS] [-d DEBUG] [-l LOG_FILE]

The parameters for the attacks are:

* -t: Target domain. Example: test.com

* -u: Single username. Example: [email protected]

* -U: File with a list of usernames. Example: users.txt

* -p: Single password: Example: Company123

* -P: File with a list of passwords. Example: passwords.txt

* -UP: File with a list of credentials in the format "username:password". Example: userpass.txt

* -m : Minimum value of random seconds to wait between each test. Default: 30

* -M : Maximum value of random seconds to wait between each test. Default: 60

* -tp: Tor password (change IP addresses using Tor)

* -pl: Use a proxy list (change IP addresses using a list of proxy IPs)

* -n: Number of requests before changing IP address (used with -tp or -pl). Default: 1

* -s: Stop on success, when one correct credential is found. Default: False

* -r: Randomize the combination of users and passwords. Default: True

* -d: Show d ebug messages. Default: True

* -l: Log file location with already tested credentials. Default: tested.txt

Examples

Password spraying with password "Company123", tor password is "test123" and changing the IP every 3 requests:

python3 adfsbrute.py -t company.com -U users.txt -p Company123 -tp test123 -n 3


ย 

Password spraying with password "Company123", tor password is "test123", changing the IP for every request, random delay time between 10 and 20 seconds and do not randomize the order of users:

python3 adfsbrute.py -t company.com -U users.txt -p Company123 -tp test123 -m 10 -M 20 -r False



Finding ADFS url:

python3 adfsbrute.py -t company.com



Using Tor

To use Tor to change the IP for every request, you must hash a password:

tor --hash-password test123

In the file /etc/tor/torrc, uncomment the variable ControlPort and the variable HashedControlPassword, and in this last one add the hash:

ControlPort 9051
HashedControlPassword 16:7F314CAB402A81F860B3EE449B743AEC0DED9F27FA41831737E2F08F87

Restart the tor service and use this password as argument for the script ("-tp test123" or "--tor_password 123")

service tor restart

Note

This script is implemented to test in security audits, DO NOT use without proper authorization from the company owning the ADFS or you will block accounts.



...



๐Ÿ“Œ Adfsbrute - A Script To Test Credentials Against Active Directory Federation Services (ADFS), Allowing Password Spraying Or Bruteforce Attacks


๐Ÿ“ˆ 196.72 Punkte

๐Ÿ“Œ Microsoft Windows Server 2012/Server 2016 Active Directory Federation Services /adfs/ls txtBoxEmail Server-Side Request Forgery


๐Ÿ“ˆ 64.34 Punkte

๐Ÿ“Œ Vulnerable-AD - Create A Vulnerable Active Directory That'S Allowing You To Test Most Of Active Directory Attacks In Local Lab


๐Ÿ“ˆ 54.3 Punkte

๐Ÿ“Œ Spray - A Password Spraying Tool For Active Directory Credentials By Jacob Wilkin(Greenwolf)


๐Ÿ“ˆ 51.35 Punkte

๐Ÿ“Œ Microsoft Active Directory Federated Services (ADFS) User Enumeration


๐Ÿ“ˆ 46.4 Punkte

๐Ÿ“Œ Microsoft Active Directory Federated Services (ADFS) User Enumeration


๐Ÿ“ˆ 46.4 Punkte

๐Ÿ“Œ #0daytoday #Microsoft Active Directory Federated Services (ADFS) User Enumeration Vulnerability [#0day #Exploit]


๐Ÿ“ˆ 46.4 Punkte

๐Ÿ“Œ [papers] - Tetris Heap Spraying: Spraying the Heap on a Budget


๐Ÿ“ˆ 44.42 Punkte

๐Ÿ“Œ [papers] - Tetris Heap Spraying: Spraying the Heap on a Budget


๐Ÿ“ˆ 44.42 Punkte

๐Ÿ“Œ Microsoft Windows Active Directory Federation Service credentials management


๐Ÿ“ˆ 41.06 Punkte

๐Ÿ“Œ Cisco warns of password-spraying attacks targeting VPN services


๐Ÿ“ˆ 39.97 Punkte

๐Ÿ“Œ Spraygen โ€“ Password List Generator for Password Spraying Attacks


๐Ÿ“ˆ 39.82 Punkte

๐Ÿ“Œ Verbesserungen der Active Directory Federation Services in Windows Server 2016


๐Ÿ“ˆ 39.2 Punkte

๐Ÿ“Œ MS16-020 - Important: Security Update for Active Directory Federation Services to Address Denial of Service (3134222) - Version: 1.0


๐Ÿ“ˆ 39.2 Punkte

๐Ÿ“Œ Verbesserungen der Active Directory Federation Services in Windows Server 2016


๐Ÿ“ˆ 39.2 Punkte

๐Ÿ“Œ MS16-020 - Important: Security Update for Active Directory Federation Services to Address Denial of Service (3134222) - Version: 1.0


๐Ÿ“ˆ 39.2 Punkte

๐Ÿ“Œ Microsoft Windows Active Directory Federation Services Information Disclosure


๐Ÿ“ˆ 39.2 Punkte

๐Ÿ“Œ MS17-019 - Important: Security Update for Active Directory Federation Services (4010320) - Version: 1.0


๐Ÿ“ˆ 39.2 Punkte

๐Ÿ“Œ Microsoft Windows Active Directory Federation Services XXE information disclosure


๐Ÿ“ˆ 39.2 Punkte

๐Ÿ“Œ Microsoft Active Directory Federation Services Web Customizations Cross Site Scripting


๐Ÿ“ˆ 39.2 Punkte

๐Ÿ“Œ Microsoft Active Directory Federation Services Web Customizations cross site scripting


๐Ÿ“ˆ 39.2 Punkte

๐Ÿ“Œ Microsoft Windows up to Server 2019 Active Directory Federation Services cross site scripting


๐Ÿ“ˆ 39.2 Punkte

๐Ÿ“Œ Microsoft Windows up to Server 2019 Active Directory Federation Services cross site scripting


๐Ÿ“ˆ 39.2 Punkte

๐Ÿ“Œ Microsoft Windows up to Server 2019 Active Directory Federation Services cross site scripting


๐Ÿ“ˆ 39.2 Punkte

๐Ÿ“Œ Microsoft Windows Server 2008/Server 2012 Active Directory Federation Services Unspecified Account information disclosure


๐Ÿ“ˆ 39.2 Punkte

๐Ÿ“Œ CVE-2022-30215 | Microsoft Windows Server 20H2/Server 2016/Server 2019/Server 2022 Active Directory Federation Services Privilege Escalation


๐Ÿ“ˆ 39.2 Punkte

๐Ÿ“Œ Password Spraying Outlook Web Access โ€“ How to Gain Access to Domain Credentials Without Being on a Targetโ€™s Network: Part 2


๐Ÿ“ˆ 36.27 Punkte

๐Ÿ“Œ CVE-2016-0413 | Oracle Identity Federation 11.1.1.7 Federation protocol support unknown vulnerability (ID 1034711)


๐Ÿ“ˆ 35.88 Punkte

๐Ÿ“Œ Spraygen - Password List Generator For Password Spraying


๐Ÿ“ˆ 34.26 Punkte

๐Ÿ“Œ Securing Active Directory accounts against password-based attacks


๐Ÿ“ˆ 34.04 Punkte

๐Ÿ“Œ Healthcare organizations targeted with password spraying attacks


๐Ÿ“ˆ 33.79 Punkte

๐Ÿ“Œ Cisco warns of password-spraying attacks targeting Secure Firewall devices


๐Ÿ“ˆ 33.79 Punkte

๐Ÿ“Œ Microsoft Windows up to Server 2019 Active Directory Federation Service 2FA improper authentication


๐Ÿ“ˆ 33.03 Punkte

๐Ÿ“Œ CVE-2016-0037 | Microsoft Windows Server 2012 R2 Active Directory Federation Service input validation (MS16-020 / BID-82507)


๐Ÿ“ˆ 33.03 Punkte











matomo