Skip to content

UC0006: Successfull OWA Password Spraying attack

Summary

ID UC0006
Brief Description Attackers can carry out a Password Spryaing attack through the publicly accessible interface of the Outlook Web Application. Their purpose may be to obtain a valid domain account for reading mail or authentication in other remote access systems.
Author @ERMACK_COMMUNITY
Creation Date 2022/10/26
Modification Date 2022/10/26
ATT&CK Tactics
ATT&CK Techniques
Tags
  • Brute
  • External Attack
Linked Response Playbooks
Artifacts

Description

Attackers can carry out a Password Spryaing attack through the publicly accessible interface of the Outlook Web Application. Their purpose may be to obtain a valid domain account for reading mail or authentication in other remote access systems.

Attack prerequisites

1) OWA Network Availability

Attack results

1) One or more domain accounts

Attack progress

Study

Password policy definition

Techniques Determining the minimum and maximum password lengths Determining the format of valid passwords Defining an Account Lockout Policy

Choose passwords

Techniques Selecting passwords from a list of generally accepted or created based on information about a particular user The choice of passwords is based on the password policies of the target system

Exploitation

Password guessing

Techniques Manually or automatically enter the first password for each known account on the target system. It is advisable to choose short and simple passwords first, because most users do this when choosing their password. Repeat previous step for each password