Brute Force - CheatSheet

Default Credentials

Search in google for default credentials of the technology that is being used, or try this links:

Create your own Dictionaries

Find as much information about the target as you can and generate a custom dictionary. Tools that may help:

Crunch

crunch 4 6 0123456789ABCDEF -o crunch1.txt #From length 4 to 6 using that alphabet
crunch 4 4 -f /usr/share/crunch/charset.lst mixalpha # Only length 4 using charset mixalpha (inside file charset.lst)

@ Lower case alpha characters
, Upper case alpha characters
% Numeric characters
^ Special characters including spac
crunch 6 8 -t ,@@^^%%

Cewl

Wordlists

Services

Ordered alphabetically by service name.

AFP

AJP

Cassandra

CouchDB

Elasticsearch

FTP

HTTP Generic Brute

WFuzz****

HTTP Basic Auth

HTTP - Post Form

For https you have to change from "http-post-form" to "https-post-form"

HTTP - CMS -- (W)ordpress, (J)oomla or (D)rupal or (M)oodle

IMAP

IRC

ISCSI

LDAP

Mongo

MySQL

OracleSQL

In order to use oracle_login with patator you need to install:

Offline OracleSQL hash bruteforce (versions 11.1.0.6, 11.1.0.7, 11.2.0.1, 11.2.0.2, and 11.2.0.3):

POP

PostgreSQL

PPTP

You can download the .deb package to install from https://http.kali.org/pool/main/t/thc-pptp-bruter/

RDP

Redis

Rexec

Rlogin

Rsh

http://pentestmonkey.net/tools/misc/rsh-grind

Rsync

RTSP

SNMP

SMB

SMTP

SQL Server

SSH

Telnet

VNC

Winrm

Local

Online cracking databases

Check this out before trying to bruteforce a Hash.

ZIP

7z

PDF

JWT

NTLM cracking

Keepass

Keberoasting

Lucks image

Method 1

Install: https://github.com/glv2/bruteforce-luks

Method 2

Mysql

Tools

Hash examples: https://openwall.info/wiki/john/sample-hashes

Hash-identifier

John mutation

Read /etc/john/john.conf and configure it

Hashcat

Cracking Linux Hashes - /etc/shadow file

Cracking Windows Hashes

Cracking Common Application Hashes

最后更新于

这有帮助吗?