Brute Force - CheatSheet
Default Credentials
Search in google for default credentials of the technology that is being used, or try this links:
****https://www.cirt.net/passwords****
Create your own Dictionaries
Find as much information about the target as you can and generate a custom dictionary. Tools that may help:
Crunch
crunch 4 6 0123456789ABCDEF -o crunch1.txt #From length 4 to 6 using that alphabet
crunch 4 4 -f /usr/share/crunch/charset.lst mixalpha # Only length 4 using charset mixalpha (inside file charset.lst)
@ Lower case alpha characters
, Upper case alpha characters
% Numeric characters
^ Special characters including spac
crunch 6 8 -t ,@@^^%%Cewl
Wordlists
Services
Ordered alphabetically by service name.
AFP
AJP
Cassandra
CouchDB
Elasticsearch
FTP
HTTP Generic Brute
WFuzz****
HTTP Basic Auth
HTTP - Post Form
For https you have to change from "http-post-form" to "https-post-form"
HTTP - CMS -- (W)ordpress, (J)oomla or (D)rupal or (M)oodle
IMAP
IRC
ISCSI
LDAP
Mongo
MySQL
OracleSQL
In order to use oracle_login with patator you need to install:
Offline OracleSQL hash bruteforce (versions 11.1.0.6, 11.1.0.7, 11.2.0.1, 11.2.0.2, and 11.2.0.3):
POP
PostgreSQL
PPTP
You can download the .deb package to install from https://http.kali.org/pool/main/t/thc-pptp-bruter/
RDP
Redis
Rexec
Rlogin
Rsh
http://pentestmonkey.net/tools/misc/rsh-grind
Rsync
RTSP
SNMP
SMB
SMTP
SQL Server
SSH
Telnet
VNC
Winrm
Local
Online cracking databases
http://hashtoolkit.com/reverse-hash?(MD5 & SHA1)https://www.onlinehashcrack.com/ (Hashes, WPA2 captures, and archives MSOffice, ZIP, PDF...)
https://crackstation.net/ (Hashes)
https://md5decrypt.net/ (MD5)
https://gpuhash.me/ (Hashes and file hashes)
https://hashes.org/search.php (Hashes)
https://www.cmd5.org/ (Hashes)
https://hashkiller.co.uk/Cracker (MD5, NTLM, SHA1, MySQL5, SHA256, SHA512)
Check this out before trying to bruteforce a Hash.
ZIP
7z
PDF
JWT
NTLM cracking
Keepass
Keberoasting
Lucks image
Method 1
Install: https://github.com/glv2/bruteforce-luks
Method 2
Mysql
Tools
Hash examples: https://openwall.info/wiki/john/sample-hashes
Hash-identifier
John mutation
Read /etc/john/john.conf and configure it
Hashcat
Cracking Linux Hashes - /etc/shadow file
Cracking Windows Hashes
Cracking Common Application Hashes
最后更新于
这有帮助吗?