Password Spraying
Adversaries may use a single or small list of commonly used passwords against many different accounts to attempt to acquire valid account credentials. Password spraying uses one password (e.g. 'Password01'), or a small list of commonly used passwords, that may match the complexity policy of the domain. Logins are attempted with that password against many different accounts on a network to avoid account lockouts that would normally occur when brute forcing a single account with many passwords. (C...
BY SOURCE
PROCEDURES (26)
Auto-extracted: 8 detections for unusual
Auto-extracted: 6 detections for kerbero
Auto-extracted: 5 detections for brute force
Auto-extracted: 5 detections for credential
Auto-extracted: 4 detections for azure
Auto-extracted: 4 detections for privilege
Auto-extracted: 3 detections for bypass
Auto-extracted: 3 detections for authentication monitoring
Auto-extracted: 3 detections for aws
Auto-extracted: 3 detections for spray
Auto-extracted: 3 detections for brute force
Auto-extracted: 2 detections for anomal
Auto-extracted: 2 detections for cloud
Auto-extracted: 2 detections for service
Auto-extracted: 1 detections for remote
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for spray
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for remote
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for lateral