Bruteforcing
Wordlists
SecLists - https://github.com/danielmiessler/SecLists
Dirsearch - https://github.com/maurosoria/dirsearch/blob/master/db/dicc.txt
Assetnote - https://wordlists.assetnote.io/
OneRuleToRuleThemAll - https://github.com/d4rkduck1/OneRuleToRuleThemAll
// For removing duplications in wordlist
cat wordlist.txt| sort | uniq > new_word.txt
By default Kali should already ship with the following wordlists:
Directory Bruteforce
Cewl
cewl -d 2 -m 5 -w docswords.txt http://10.10.10.10 ​
-d depth
-m minimum word length
-w output file
--lowercase lowercase all parsed words (optional)
Password / Hash Bruteforce
Hashcat
To know which m parameter to set (-m) ​ - https://hashcat.net/wiki/doku.php?id=hashcat
To identify the hash (hashid) - https://mattw.io/hashID/types
hashcat -m 0 'hash$' /usr/share/wordlists/rockyou.txt // MD5 raw
hashcat -m 1800 'hash$' /usr/share/wordlists/rockyou.txt // sha512crypt
hashcat -m 1600 'hash$' /usr/share/wordlists/rockyou.txt // MD5(APR)
hashcat -m 1500 'hash$' /usr/share/wordlists/rockyou.txt // DES(Unix), Traditional DES, DEScrypt
hashcat -m 500 'hash$' /usr/share/wordlists/rockyou.txt // MD5crypt, MD5 (Unix)
hashcat -m 400 'hash$' /usr/share/wordlists/rockyou.txt // Wordpress
John (JTR)
john hashfile --wordlist=/usr/share/wordlists/rockyou.txt --format=raw-md5
Protocols Bruteforce
Hydra
TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, SMB, SMBNT, MS-SQL, MYSQL, REXEC, irc, RSH, RLOGIN, CVS, SNMP, SMTP, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, XMPP, ICQ, SAP/R3, LDAP2, LDAP3, Postgres, Teamspeak, Cisco auth, Cisco enable, AFP, Subversion/SVN, Firebird, LDAP2, Cisco AAA
Medusa
AFP, CVS, FTP, HTTP, IMAP, MS-SQL, MySQL, NetWare NCP, NNTP, PcAnywhere, POP3, PostgreSQL, REXEC, RLOGIN, RSH, SMBNT, SMTP-AUTH, SMTP-VRFY, SNMP, SSHv2, Subversion (SVN), Telnet, VMware Authentication Daemon (vmauthd), VNC, Generic Wrapper, Web Form
Ncrak (faster)
RDP, SSH, http(s), SMB, pop3(s), VNC, FTP, telnet
SSH
ncrack -v -U user.txt -P pass.txt ssh://10.10.10.10: -T5
hydra -L users.txt -P pass.txt 192.168.0.114 ssh
SMB
ncrack -u qiu -P /usr/share/wordlists/rockyou.txt -T 5 192.168.0.116 -p smb -v
HTTP-Post
hydra -L users.txt -P rockyou.txt 10.10.10.10 http-post-form "/login.php:user=^USER^&pass=^PASS^:Invalid Username or Password" -V -s 7654
Last updated