Brute Force Attack in O365

Created by Baijnath Kumar, Modified on Thu, 17 Oct, 2019 at 10:02 AM by Baijnath Kumar

Text Box


BRUTE FORCE ATTACK 

Brute force attack against a password system attempts to exhaustively enumerate and try all password combinations. The increasing computational power of computers makes it computationally practical to guess longer and longer password. To overcome this, password length and complexity requirements can be introduced, to make guessing impractical again. 

How To Simulate A Brute Force Attack In Office 365? 

  1. In the Security & Compliance Center, choose Threat management > Attack simulator. 

  1. From the options, choose the attack Brute Force Password and press the Launch Attack button to begin the wizard. 

 

  1. Name the new campaign and then press Next. 

  

  1. Select the Target users, by choosing specific user accounts or groups. 

 

  1. Once you have selected the users or groups, press Next then set the password properties as needed. 

  1. Either a single password can be entered, which can be useful for checking single passwords. A file can also be uploaded, that contains multiple passwords, allowing for iteration of the password list against the selected accounts. If a single password is used, type the password in the name box, or if a file is needed to be uploaded, upload it using the link shown in the figure. 

 

  1. Once the attack is complete, the status is updated, and a View Report link is then available. 

 

  1. Clicking this link then displays the number of accounts with passwords that matched any of the values within the password file used within the attack. 

 

  1. You can also see a short report by clicking the Attack Details link, within the specific attack displayed on the Attack Simulator page. 

 

 

 

 

 

 

SOURCE: 

ShapeText BoxText BoxText BoxText BoxText BoxPage Breaks 

 


 

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article