Page cover

Password Attacks

Generating Wordlists

Cewl - Custom Word List generator

-> generating wordlist based on information from a website

cewl <domain> -w wordlist.txt

Crunch - Wordlist Generator

-> Character Translation @ = Lower case alpha characters , = Upper case alpha characters % = Numeric characters ^ = Special characters including space

-> Usage

./crunch <min-len> <max-len> [charset]

-> basic examples

crunch 9 9 -t ,@@@@^%%%
crunch 4 6 0123456789abcdef -o wordlist.txt

John Mutation

-> Add the rules you want in the /etc/john/john.conf file inside the rules module [List.Rules:Wordlist] to modify your wordlists -> basic rule example $@$[1-2]$[0-9]$[0-9]$[0-9]

john --wordlist=wordlist.txt --rules --stdout > mutated.txt

https://www.openwall.com/john/doc/RULES.shtmlarrow-up-right

Cracking Password

Identifying Hash Type

https://www.tunnelsup.com/hash-analyzer/arrow-up-right https://hashes.com/en/tools/hash_identifierarrow-up-right

Hashing different file types for cracking with 2john

Password Manager

-> Search KeePass database files

-> Hashing the .kdbx file

-> Finding Hash-Mode ID of hashcat

-> Cracking

Brute Force Attacks

RDP Brute Force - Hydra

RDP Brute Force - Crowbar

SMB Brute Force - Hydra

SSH Brute Force - Hydra

HTTP POST Login Form Brute Force - Hydra

HTTP GET Login Form Brute Force - Hydra

Last updated