Low and slow password spraying tool, designed to spray on an interval over a long period of time.
Project description
Table of Contents
spraycharles
Overview
Low and slow password spraying tool, designed to spray on an interval over a long period of time.
Associated blog post by @sprocket_ed covering NTLM over HTTP, Exchange Web Services and spraycharles.
Install
Using pipx
You can use pipx to to install the spraycharles package into an isolated environment. First install pipx:
pip3 install pipx
pipx ensurepath
Following this, install the package with the following command:
pipx install spraycharles
The spraycharles package will then be in your path and useable from anywhere.
Note that log and output CSV files are stored in a directory created in your users home folder with the name .spraycharles
. These log and CSV files are dynamically created on runtime. These files are in the format: target-host.timestamp.csv
.
See usage for instructions on how to specify an alternative location for your CSV file.
Using Docker
Execute the following commands to build the spraycharles Docker container:
git clone https://github.com/Tw1sm/spraycharles
cd spraycharles/extras
docker build . -t spraycharles
Execute the following command to use the spraycharles Docker container:
docker run -it -v ~/.spraycharles:/root/.spraycharles spraycharles -h
You may need to specify additional volumes based on where username a password lists are being stored.
Usage
Usage: spraycharles spray [OPTIONS]
Low and slow password spraying tool.
Options:
-p, --passwords TEXT Filepath of the passwords list or a single
password to spray. [required]
-u, --usernames TEXT Filepath of the usernames list. [required]
-H, --host TEXT Host to password spray (ip or hostname). Can
by anything when using Office365 module -
only used for logfile name.
-m, --module TEXT Module corresponding to target host.
[required]
--path TEXT NTLM authentication endpoint. Ex: rpc or ews
-o, --output TEXT Name and path of output csv where attempts
will be logged.
-a, --attempts INTEGER Number of logins submissions per interval
(for each user).
-i, --interval INTEGER Minutes inbetween login intervals.
-e, --equal INTEGER Does 1 spray for each user where password =
username.
-t, --timeout INTEGER Web request timeout threshold. Default is 5
seconds.
-P, --port INTEGER Port to connect to on the specified host.
Default is 443.
-f, --fireprox TEXT The url of the fireprox interface, if you
are using fireprox.
-d, --domain TEXT HTTP: Prepend DOMAIN\ to usernames. SMB:
Supply domain for smb connection.
--analyze Run the results analyzer after each spray
interval. False positives are more likely
--pause Pause the spray following a potentially
successful login
-j, --jitter INTEGER Jitter time between requests in seconds.
-jm, --jitter-min INTEGER Minimum time between requests in seconds.
-n, --notify [teams|slack|discord]
Enable notifications for Slack, MS Teams or
Discord.
-w, --webhook TEXT Webhook used for specified notification
module
--config FILE Read configuration from FILE.
-h, --help Show this message and exit.
Spraycharles also includes other submodules:
Usage: spraycharles [OPTIONS] COMMAND [ARGS]...
Options:
--help Show this message and exit.
Commands:
analyze Analyze existing csv files.
gen Generate custom password lists from JSON file.
modules List all the available spraying modules
parse Parse NTLM over HTTP and SMB endpoints to collect domain...
spray Low and slow password spraying tool.
See below for further information about these modules.
Config File
It is possible to pre-populate command line arguments form a configuration file using the --config
argument.
An example configuration file is listed below:
usernames = '/tmp/users.txt'
passwords = '/tmp/passwords.txt'
output = 'mail.acme.com.csv'
module = 'owa'
host = 'mail.acme.com'
domain = 'ACME'
analyze = 'True'
attempts = '1'
interval = '30'
timeout = '25'
Notifications
Spraycharles has the ability to issue notifications to Discord, Slack and Microsoft Teams following a potentially successful login attempt. This list of notification providers can augmented using the utils/notify.py script. For any of the potential notification agents, you must specify its name and a webhook URL.
It is best to specify this information using the configuration file to keep your command shorter:
notify = 'slack'
webhook = 'https://hooks.slack.com/services/T00000000/B00000000/XXXXXXXXXXXXXXXXXXXXXXXX'
Notifications sent to any of the providers will include the targeted hostname associated with the spraying job. This is expecially useful when spraying multiple targets at once using spraycharles.
Examples
Basic usage (Office365)
spraycharles spray -u users.txt -p passwords.txt -m Office365
Basic usage (non-Office365) with a single password, supplied via command line
spraycharles spray -u users.txt -H webmail.company.com -p Password123 -m owa
Attempt 5 logins per user every 20 minutes
spraycharles spray -u users.txt -H webmail.company.com -p passwords.txt -i 20 -a 5 -m owa
Usage with fireprox (Office365)
spraycharles spray -u users.txt -p passwords.txt -m office365 -f abcdefg.execute-api.us-east-1.amazonawms.com
Spray host over SMB with 2 attempts per user every hour
spraycharles spray -u users.txt -p passwords.txt -m Smb -H 10.10.1.5 -a 2 -i 60
Utilities
Spraycharles is packaged with some additional utilities to assist with spraying efforts.
Generating Custom Spray Lists
The spraycharles "gen" subcommand will generate a password list based off the specifications provided in extras/list_elements.json
spraycharles gen extras/list_elements.json custom_passwords.txt
Extracting Domain from NTLM over HTTP and SMB
The spraycharles parse subcommand will extract the internal domain from both NTLM over HTTP and SMB services using a command similar to the one listed below.
spraycharles parse https://example.com/ews
Analyzing the results CSV file
The analyze
submodule can read your output CSV and determine response lengths that are statistically relevant. With enough data, it should be able to pull successful logins out of your CSV file. This is not the only way to determine successful logins, depending on your target site, and I would still recommend checking the data yourself to be sure nothing is missed. For SMB, it will simply find entries with NTSTATUS codes that indicate success.
spraycharles analyze myresults.csv
Disclaimer
This tool is designed for use during penetration testing; usage of this tool for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse of this program.
Development
Git pre-commit is used to maintain code quality and ensure uniform formatting. To begin developing with spraycharles:
pip3 install poetry
git clone https://github.com/Tw1sm/spraycharles
cd spraycharles
poetry install
Tests for the spraycharles project are written and stored in the tests directory. A more extensive testing harness is coming soon!
Credits
- @sprocket_ed for contributing: several spray modules, many of features that make spraycharles great, and the associated blog post
- @b17zr for the
ntlm_challenger.py
script, which is included in theutils
folder
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for spraycharles-1.0.9-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 81bf5ee1ebc058fc00afd57f0e289231ab6995ad9a8b77cfb420df69b922b4bf |
|
MD5 | 1e5c2a7b6142bdebc2342d73dd9498f2 |
|
BLAKE2b-256 | bd33281a54051ce20ef129d7e39353a3410595fe6307f54fc1b5b567ab30c237 |