githubEdit

Brute Force - CheatSheet

Use Trickestarrow-up-right to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today:

circle-check

Default Credentials

Search in google for default credentials of the technology that is being used, or try these links:

Create your own Dictionaries

Find as much information about the target as you can and generate a custom dictionary. Tools that may help:

Crunch

Cewl

Generate passwords based on your knowledge of the victim (names, dates...)

A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the given words, creating a unique and ideal wordlist to use regarding a specific target.

Wordlists

Use Trickestarrow-up-right to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today:

Services

Ordered alphabetically by service name.

AFP

AJP

AMQP (ActiveMQ, RabbitMQ, Qpid, JORAM and Solace)

Cassandra

CouchDB

Docker Registry

Elasticsearch

FTP

HTTP Generic Brute

HTTP Basic Auth

HTTP - NTLM

HTTP - Post Form

For https you have to change from "http-post-form" to "https-post-form"

HTTP - CMS -- (W)ordpress, (J)oomla or (D)rupal or (M)oodle

IMAP

IRC

ISCSI

JWT

LDAP

MQTT

Mongo

MSSQL

MSSQLPwnerarrow-up-right

MySQL

OracleSQL

In order to use oracle_login with patator you need to install:

Offline OracleSQL hash bruteforcearrow-up-right (versions 11.1.0.6, 11.1.0.7, 11.2.0.1, 11.2.0.2, and 11.2.0.3):

POP

PostgreSQL

PPTP

You can download the .deb package to install from https://http.kali.org/pool/main/t/thc-pptp-bruter/arrow-up-right

RDP

Redis

Rexec

Rlogin

Rsh

http://pentestmonkey.net/tools/misc/rsh-grindarrow-up-right

Rsync

RTSP

SFTP

SNMP

SMB

SMTP

SOCKS

SQL Server

SSH

Weak SSH keys / Debian predictable PRNG

Some systems have known flaws in the random seed used to generate cryptographic material. This can result in a dramatically reduced keyspace which can be bruteforced with tools such as snowdroppe/ssh-keybrutearrow-up-right. Pre-generated sets of weak keys are also available such as g0tmi1k/debian-ssharrow-up-right.

STOMP (ActiveMQ, RabbitMQ, HornetQ and OpenMQ)

The STOMP text protocol is a widely used messaging protocol that allows seamless communication and interaction with popular message queueing services such as RabbitMQ, ActiveMQ, HornetQ, and OpenMQ. It provides a standardized and efficient approach to exchange messages and perform various messaging operations.

Telnet

VNC

Winrm

Use Trickestarrow-up-right to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today:

Local

Online cracking databases

Check this out before trying to brute force a Hash.

ZIP

Known plaintext zip attack

You need to know the plaintext (or part of the plaintext) of a file contained inside the encrypted zip. You can check filenames and size of files contained inside an encrypted zip running: 7z l encrypted.zip Download bkcrack arrow-up-rightfrom the releases page.

7z

PDF

PDF Owner Password

To crack a PDF Owner password check this: https://blog.didierstevens.com/2022/06/27/quickpost-cracking-pdf-owner-passwords/arrow-up-right

JWT

NTLM cracking

Keepass

Keberoasting

Lucks image

Method 1

Install: https://github.com/glv2/bruteforce-luksarrow-up-right

Method 2

Another Luks BF tutorial: http://blog.dclabs.com.br/2020/03/bruteforcing-linux-disk-encription-luks.html?m=1arrow-up-right

Mysql

PGP/GPG Private key

Cisco

DPAPI Master Key

Use https://github.com/openwall/john/blob/bleeding-jumbo/run/DPAPImk2john.pyarrow-up-right and then john

Open Office Pwd Protected Column

If you have an xlsx file with a column protected by a password you can unprotect it:

  • Upload it to google drive and the password will be automatically removed

  • To remove it manually:

PFX Certificates

Use Trickestarrow-up-right to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today:

Tools

Hash examples: https://openwall.info/wiki/john/sample-hashesarrow-up-right

Hash-identifier

Wordlists

Wordlist Generation Tools

John mutation

Read /etc/john/john.conf and configure it

Hashcat

Hashcat attacks

  • Wordlist attack (-a 0) with rules

Hashcat already comes with a folder containing rules but you can find other interesting rules herearrow-up-right.

  • Wordlist combinator attack

It's possible to combine 2 wordlists into 1 with hashcat. If list 1 contained the word "hello" and the second contained 2 lines with the words "world" and "earth". The words helloworld and helloearth will be generated.

  • Mask attack (-a 3)

  • Wordlist + Mask (-a 6) / Mask + Wordlist (-a 7) attack

Hashcat modes

Cracking Linux Hashes - /etc/shadow file

Cracking Windows Hashes

Cracking Common Application Hashes

circle-check

Use Trickestarrow-up-right to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today:

Last updated