Brute Force - CheatSheet

Use Trickest to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today:

Default Credentials

Search in google for default credentials of the technology that is being used, or try these links:

Create your own Dictionaries

Find as much information about the target as you can and generate a custom dictionary. Tools that may help:

Crunch

Cewl

Generate passwords based on your knowledge of the victim (names, dates...)

A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the given words, creating a unique and ideal wordlist to use regarding a specific target.

Wordlists

Use Trickest to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today:

Services

Ordered alphabetically by service name.

AFP

AJP

AMQP (ActiveMQ, RabbitMQ, Qpid, JORAM and Solace)

Cassandra

CouchDB

Docker Registry

Elasticsearch

FTP

HTTP Generic Brute

HTTP Basic Auth

HTTP - NTLM

HTTP - Post Form

For https you have to change from "http-post-form" to "https-post-form"

HTTP - CMS -- (W)ordpress, (J)oomla or (D)rupal or (M)oodle

IMAP

IRC

ISCSI

JWT

LDAP

MQTT

Mongo

MSSQL

MSSQLPwner

MySQL

OracleSQL

In order to use oracle_login with patator you need to install:

Offline OracleSQL hash bruteforce (versions 11.1.0.6, 11.1.0.7, 11.2.0.1, 11.2.0.2, and 11.2.0.3):

POP

PostgreSQL

PPTP

You can download the .deb package to install from https://http.kali.org/pool/main/t/thc-pptp-bruter/

RDP

Redis

Rexec

Rlogin

Rsh

http://pentestmonkey.net/tools/misc/rsh-grind

Rsync

RTSP

SFTP

SNMP

SMB

SMTP

SOCKS

SQL Server

SSH

Weak SSH keys / Debian predictable PRNG

Some systems have known flaws in the random seed used to generate cryptographic material. This can result in a dramatically reduced keyspace which can be bruteforced with tools such as snowdroppe/ssh-keybrute. Pre-generated sets of weak keys are also available such as g0tmi1k/debian-ssh.

STOMP (ActiveMQ, RabbitMQ, HornetQ and OpenMQ)

The STOMP text protocol is a widely used messaging protocol that allows seamless communication and interaction with popular message queueing services such as RabbitMQ, ActiveMQ, HornetQ, and OpenMQ. It provides a standardized and efficient approach to exchange messages and perform various messaging operations.

Telnet

VNC

Winrm

Use Trickest to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today:

Local

Online cracking databases

Check this out before trying to brute force a Hash.

ZIP

Known plaintext zip attack

You need to know the plaintext (or part of the plaintext) of a file contained inside the encrypted zip. You can check filenames and size of files contained inside an encrypted zip running: 7z l encrypted.zip Download bkcrack from the releases page.

7z

PDF

PDF Owner Password

To crack a PDF Owner password check this: https://blog.didierstevens.com/2022/06/27/quickpost-cracking-pdf-owner-passwords/

JWT

NTLM cracking

Keepass

Keberoasting

Lucks image

Method 1

Install: https://github.com/glv2/bruteforce-luks

Method 2

Another Luks BF tutorial: http://blog.dclabs.com.br/2020/03/bruteforcing-linux-disk-encription-luks.html?m=1

Mysql

PGP/GPG Private key

Cisco

DPAPI Master Key

Use https://github.com/openwall/john/blob/bleeding-jumbo/run/DPAPImk2john.py and then john

Open Office Pwd Protected Column

If you have an xlsx file with a column protected by a password you can unprotect it:

  • Upload it to google drive and the password will be automatically removed

  • To remove it manually:

PFX Certificates

Use Trickest to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today:

Tools

Hash examples: https://openwall.info/wiki/john/sample-hashes

Hash-identifier

Wordlists

Wordlist Generation Tools

  • kwprocessor: Advanced keyboard-walk generator with configurable base chars, keymap and routes.

John mutation

Read /etc/john/john.conf and configure it

Hashcat

Hashcat attacks

  • Wordlist attack (-a 0) with rules

Hashcat already comes with a folder containing rules but you can find other interesting rules here.

  • Wordlist combinator attack

It's possible to combine 2 wordlists into 1 with hashcat. If list 1 contained the word "hello" and the second contained 2 lines with the words "world" and "earth". The words helloworld and helloearth will be generated.

  • Mask attack (-a 3)

  • Wordlist + Mask (-a 6) / Mask + Wordlist (-a 7) attack

Hashcat modes

Cracking Linux Hashes - /etc/shadow file

Cracking Windows Hashes

Cracking Common Application Hashes

Use Trickest to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today:

Last updated