Overview#Password Spraying (or Password Guessing) refers to an attack method that takes a large number of usernames and loops them with a single password.
The attacker can use multiple iterations using a number of different passwords, but the number of passwords attempted is usually low when compared to the number of users attempted. This method avoids Intruder Lockout Checks, and it is often more effective at uncovering weak passwords than targeting specific users.
- 2 minutes – the time taken for the first pass with a Password Dictionary and 64 rules to crack the first 38,000 passwords’
- Just under five days – time taken to brute force all passwords up through eight characters in length;
- 12 – average number of passwords cracked per user account (either because they used a poor password, or it was eight characters or less, or both;
- 87.8 per cent of the passwords cracked were broken using the easily available CrackStation password cracking Password Dictionary. By comparison only 12.2 per cent of the passwords cracked via brute force. The lesson, the author says, is using wordlists is very efficient;
- 27 characters – the longest password cracked; It was a name and digits repeated several times (Lesson: Employees do understand they have to use more than eight characters, and they still cheat), Someone used “Thisisalongpassword.” That wasn’t bad — except they used the string more than once, so it was cracked.
Why are Password Spraying done off-line?#Hopefully most Applications utilize some sort of Server-Side Login throttling schemes and / or Intruder Detection methods. So it is common for an Attacker to steal a document or password store, even if it is Encrypted where the Brute-Force Password Spraying can be performed.
More Information#There might be more information for this subject on one of the following:
- [#1] - Password analysis shows employees still aren’t getting the message - based on information obtained 2017-04-13-