Brute Force - CheatSheet

Use Trickest to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today:
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:
HackTricks Training GCP Red Team Expert (GRTE)
Default Credentials
Search in google for default credentials of the technology that is being used, or try these links:
Create your own Dictionaries
Find as much information about the target as you can and generate a custom dictionary. Tools that may help:
Crunch
Cewl
Generate passwords based on your knowledge of the victim (names, dates...)
A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the given words, creating a unique and ideal wordlist to use regarding a specific target.
Wordlists

Use Trickest to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today:
Services
Ordered alphabetically by service name.
AFP
AJP
AMQP (ActiveMQ, RabbitMQ, Qpid, JORAM and Solace)
Cassandra
CouchDB
Docker Registry
Elasticsearch
FTP
HTTP Generic Brute
HTTP Basic Auth
HTTP - NTLM
HTTP - Post Form
For https you have to change from "http-post-form" to "https-post-form"
HTTP - CMS -- (W)ordpress, (J)oomla or (D)rupal or (M)oodle
IMAP
IRC
ISCSI
JWT
LDAP
MQTT
Mongo
MSSQL
MySQL
OracleSQL
In order to use oracle_login with patator you need to install:
Offline OracleSQL hash bruteforce (versions 11.1.0.6, 11.1.0.7, 11.2.0.1, 11.2.0.2, and 11.2.0.3):
POP
PostgreSQL
PPTP
You can download the .deb package to install from https://http.kali.org/pool/main/t/thc-pptp-bruter/
RDP
Redis
Rexec
Rlogin
Rsh
http://pentestmonkey.net/tools/misc/rsh-grind
Rsync
RTSP
SFTP
SNMP
SMB
SMTP
SOCKS
SQL Server
SSH
Weak SSH keys / Debian predictable PRNG
Some systems have known flaws in the random seed used to generate cryptographic material. This can result in a dramatically reduced keyspace which can be bruteforced with tools such as snowdroppe/ssh-keybrute. Pre-generated sets of weak keys are also available such as g0tmi1k/debian-ssh.
STOMP (ActiveMQ, RabbitMQ, HornetQ and OpenMQ)
The STOMP text protocol is a widely used messaging protocol that allows seamless communication and interaction with popular message queueing services such as RabbitMQ, ActiveMQ, HornetQ, and OpenMQ. It provides a standardized and efficient approach to exchange messages and perform various messaging operations.
Telnet
VNC
Winrm

Use Trickest to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today:
Local
Online cracking databases
http://hashtoolkit.com/reverse-hash?(MD5 & SHA1)https://shuck.sh/get-shucking.php (MSCHAPv2/PPTP-VPN/NetNTLMv1 with/without ESS/SSP and with any challenge's value)
https://www.onlinehashcrack.com/ (Hashes, WPA2 captures, and archives MSOffice, ZIP, PDF...)
https://crackstation.net/ (Hashes)
https://md5decrypt.net/ (MD5)
https://gpuhash.me/ (Hashes and file hashes)
https://hashes.org/search.php (Hashes)
https://www.cmd5.org/ (Hashes)
https://hashkiller.co.uk/Cracker (MD5, NTLM, SHA1, MySQL5, SHA256, SHA512)
Check this out before trying to brute force a Hash.
ZIP
Known plaintext zip attack
You need to know the plaintext (or part of the plaintext) of a file contained inside the encrypted zip. You can check filenames and size of files contained inside an encrypted zip running: 7z l encrypted.zip
Download bkcrack from the releases page.
7z
PDF
PDF Owner Password
To crack a PDF Owner password check this: https://blog.didierstevens.com/2022/06/27/quickpost-cracking-pdf-owner-passwords/
JWT
NTLM cracking
Keepass
Keberoasting
Lucks image
Method 1
Install: https://github.com/glv2/bruteforce-luks
Method 2
Another Luks BF tutorial: http://blog.dclabs.com.br/2020/03/bruteforcing-linux-disk-encription-luks.html?m=1
Mysql
PGP/GPG Private key
Cisco

DPAPI Master Key
Use https://github.com/openwall/john/blob/bleeding-jumbo/run/DPAPImk2john.py and then john
Open Office Pwd Protected Column
If you have an xlsx file with a column protected by a password you can unprotect it:
Upload it to google drive and the password will be automatically removed
To remove it manually:
PFX Certificates

Use Trickest to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today:
Tools
Hash examples: https://openwall.info/wiki/john/sample-hashes
Hash-identifier
Wordlists
Rockyou
Wordlist Generation Tools
kwprocessor: Advanced keyboard-walk generator with configurable base chars, keymap and routes.
John mutation
Read /etc/john/john.conf and configure it
Hashcat
Hashcat attacks
Wordlist attack (
-a 0) with rules
Hashcat already comes with a folder containing rules but you can find other interesting rules here.
Wordlist combinator attack
It's possible to combine 2 wordlists into 1 with hashcat.
If list 1 contained the word "hello" and the second contained 2 lines with the words "world" and "earth". The words helloworld and helloearth will be generated.
Mask attack (
-a 3)
Wordlist + Mask (
-a 6) / Mask + Wordlist (-a 7) attack
Hashcat modes
Cracking Linux Hashes - /etc/shadow file
Cracking Windows Hashes
Cracking Common Application Hashes
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:
HackTricks Training GCP Red Team Expert (GRTE)

Use Trickest to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today:
Last updated