CredMaster – Anonymous AWS‑Backed Password Spraying Toolkit
CredMaster 是一款基于 Python 的密码喷射工具,通过动态生成 Amazon API Gateway 端点旋转 IP 地址以避开节流和检测机制。支持插件架构、匿名化请求及多线程处理,适用于 Office 365 和 Okta 等高价值目标的渗透测试和防御演练。 2025-7-31 02:45:10 Author: www.darknet.org.uk(查看原文) 阅读量:26 收藏

CredMaster is a Python-based password‐spraying (aka brute forcing) utility that proxies login attempts through dynamically generated Amazon API Gateway endpoints, stealthily rotating IP addresses to evade throttle and visibility controls. It targets high-value authentication endpoints, such as Office 365 and Okta.

CredMaster - Anonymous AWS‑Backed Password Spraying Toolkit

Overview

CredMaster extends the concept of FireProx by automating proxy creation, spoofing headers, rotating user agents, and timing attempts across AWS regions. It is written in Python, supports a plugin architecture for services like Outlook Web Access, Azure SSO, ADFS, Fortinet VPN, and Okta, and includes evasion features such as jitter, delay, header spoofing, and weekly Office‐hour spraying. It earned over 1.2k GitHub stars.

Features

  • Rotates the requesting IP address for every request
  • Automatically generates APIs for proxy passthru
  • Spoofs API tracking numbers, forwarded-for IPs, and other proxy tracking headers = fully anonymous
  • Easy configuration via config file
  • Multi-threaded processing
  • Password delay counters & configuration for lockout policy evasion
  • Easily add new plugins
  • Colourised output
  • Notification systems for Keybase, Slack, Discord, Teams & Pushover
  • WeekdayWarrior setting for timed spraying and SOC evasion

Installation and Usage

Install with:

git clone https://github.com/knavesec/CredMaster.git

cd CredMaster

pip install -r requirements.txt

Then configure AWS keys and run:

python3 credmaster.py --plugin OWA \

  --access_key YOUR_KEY \

  --secret_access_key YOUR_SECRET \

  -u users.txt -p passwords.txt \

  -a useragents.txt \

  --jitter 20 --delay 30 \

  --threads 5

The tool supports full AWS region coverage, rotating proxies, and spoofed headers (“X-Forwarded-For”), while sending notifications to Slack, Discord, Teams, Keybase, and more.

Use Cases

This tool fits offensive operations, including:

  • Red teams targeting Azure AD, Okta, ADFS, or on‑prem EMS/OWA portals.
  • Testing password policies and lockout thresholds under stealth conditions.
  • Simulating realistic attacker behaviour by timing sprays during business hours.

Defensive teams can use CredMaster results to validate detection thresholds and response coverage in observability platforms.

Red Team Relevance

CredMaster addresses two key TTPs (T1110.003 Password Spraying) and throttle evasion. AWS API exploitation enables proxying shifts, spraying sources with each request, thereby reducing detection via IP heuristics. Evasion tactics like jitter, header spoofing, threaded spraying, and Weekday Warrior scheduling add realism.

Detection, Avoidance & Defence

Detection teams should tune analytic rules for:

  • Unusual authentication requests originating from AWS API Gateway IP ranges.
  • Sporadic user‐agent header patterns are typical of spray tools.
  • Temporal login clusters mimic human login hours.
  • Attempts are made across multiple user accounts within short windows, originating from various sources.

Enterprises can block AWS API endpoints or disable access logs from those ranges. Deploy network and authentication analytics to flag spray patterns across header, IP, and timing anomalies.

Conclusion

CredMaster is a powerful red team asset capable of executing evasive, anonymised password spraying. Its proxy automation, header spoofing, and AWS‑based rotation align well with realistic threat models. Defensive teams benefit from simulating this tool to improve visibility and detect advanced evasion techniques.

You can read more or download CredMaster here: https://github.com/knavesec/CredMaster

Reader Interactions


文章来源: https://www.darknet.org.uk/2025/07/credmaster-anonymous-aws%E2%80%91backed-password-spraying-toolkit/
如有侵权请联系:admin#unsafe.sh