Skip to content

ThrottleEvasion

knavesec edited this page Mar 22, 2021 · 1 revision

Throttle evasion works on a case-by-case basis, depending on the target.

Target-Specific Systems

Any on-prem system, most likely has less sophisticated rate-limiting tech, but larger companies like Microsoft/Okta have better a targets on-prem systems are likely to have less sophisticated rate-limiting capabilities. Larger authentication providers like Microsoft & Okta do a good job of detecting and throtting password spray attempts, which make life more difficult for us!

Big Auth Systems

Microsoft employs the Azure Smart Lockout defense system. If a password spray is detected, it will show every account as "locked" regardless of valid password. This detection system is proprietary, so it makes analysis more difficult. According to DaftHack's MSOLSpray tool, use with FireProx appeared to be able to bypass Smart Lockout during testing. My own testing has shown the same.

Okta detection appears to be based off number of auth attempts / time or some variation of that. Through use of any tool, I've not yet been able to sufficiently beat Okta's throttle attempts. I will note that a single thread and a relatively high jitter has allowed the spray to last a bit longer, though it does end in throttle after a while. Typically, I spray with a thread and high jitter, filter out the throttled attempts, then try again later with the other accounts to get full coverall.

Further research is necessary for all plugins and methods. Each plugin has a section for "throttle notes" on the Wiki.

Clone this wiki locally