Password spraying has long been a staple technique in penetration testing and red teaming. However, its effectiveness has significantly declined as targets begin moving to Microsoft Entra ID as an identity provider. Microsoft’s Global Banned Password List (BPL) is a major factor behind this shift—a little known security measure designed to prevent users from selecting weak or easily guessable passwords. While this is fantastic for users of the service, we all know attackers are going to adapt, so we want to beat them to it.
This lead us to ask: How does Microsoft’s BPL work, and can we adapt our approach before the attackers do?
To find answers, we examined Microsoft's official documentation on Password Protection in Microsoft Entra ID. While Microsoft keeps the BPL confidential to prevent attackers from creating passwords that evade detection, the cybersecurity team at Synacktiv managed to extract and publish the list, making it publicly available on their GitHub repository.
Let’s break down how Microsoft enforces these password restrictions.
"The global banned password list is automatically applied to all users in a Microsoft Entra tenant. There's nothing to enable or configure, and it can't be disabled. This global banned password list is applied to users when they change or reset their own password through Microsoft Entra ID."
When a user creates or changes a password, Microsoft Entra ID evaluates it through a multi-step process:
Let’s analyze the password P@$$w0rd2025:
Now, let’s slightly modify it to P@$$w0rd2025b@d:
This scoring system reveals an interesting loophole—appending a few extra characters can make an otherwise banned password valid.
Understanding the evaluation process allowed us to craft candidate passwords for spraying more effectively. To automate this process, we built a Python tool called bpl.py that evaluates whether a password will be accepted or rejected by Microsoft Entra ID.
By using bpl.py, we can ensure that only viable passwords are selected, making our approach more systematic and efficient.
While developing bpl.py, another challenge emerged—we needed a large dataset of passwords to test. Manually generating variations was inefficient, so we trained a custom GPT model to automate the process.
We analyzed years of data from our password-cracking machine to understand:
Using these insights, we developed the BPL AI-Powered Password Generation GPT model to generate realistic passwords.
BPL GPT prompts users with customization options:
Once generated, these passwords can be evaluated using bpl.py to ensure they meet the minimum score for password spraying.
Microsoft Entra ID’s Global Banned Password List (BPL) has significantly reduced the effectiveness of traditional password spraying attacks. However, by understanding how Microsoft evaluates passwords, penetration testers can refine their strategies, continue to identify potentially weak passwords for their customers, and defenders can continue to train users, and configured systems to accepts strong passwords which mitigate evolving threats.