S3cur3Th1sSh1t / WinPwn

Automation for internal Windows Penetrationtest / AD-Security

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Unable to simulate Password Spraying attack as no text file is created under Exploitation folder

IAMinZoho opened this issue · comments

Please check:

Capture21

I did see that WinPwn will ask the password to be sprayed in the code but I didn't get that option while executing the script. Please advise.

You did use the username==password check. Th this case it’s not asking for the password as that’s == the username.

The main menu also has a domain password spray option. And this asks for a password.

I think this should be straight forward to find but if you still have problems just ask

I got confused with the 3 different password spray options in the tool. Thanks to you I was able to solve the mystery and simulate it in all the 3 cases: with the user with a password blank; the same username & password; and with a custom password. Works perfectly!