{"id":945,"date":"2018-03-05T09:00:17","date_gmt":"2018-03-05T17:00:17","guid":{"rendered":"https:\/\/www.microsoft.com\/en-za\/2018\/03\/05\/azure-ad-and-adfs-best-practices-defending-against-password-spray-attacks\/"},"modified":"2022-06-28T10:51:59","modified_gmt":"2022-06-28T17:51:59","slug":"azure-ad-and-adfs-best-practices-defending-against-password-spray-attacks","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-za\/microsoft-365\/blog\/2018\/03\/05\/azure-ad-and-adfs-best-practices-defending-against-password-spray-attacks\/","title":{"rendered":"Azure AD and ADFS best practices: Defending against password spray attacks"},"content":{"rendered":"
Howdy folks,<\/p>\n
As long as we’ve had passwords, people have tried to guess them. In this blog, we’re going to talk about a common attack which has become MUCH more frequent recently and some best practices for defending against it. This attack is commonly called password spray.<\/strong><\/p>\n In a password spray attack, the bad guys try the most common passwords across many <\/em>different accounts and services to gain access to any password protected assets they can find. Usually these span many different organizations and identity providers. For example, an attacker will use a commonly available toolkit like Mailsniper<\/a> to enumerate all of the users in several organizations and then try “P@$$w0rd” and “Password1” against all of those accounts. To give you the idea, an attack might look like:<\/p>\n