Brute Force - CheatSheet

Default Credentials

Search in google for default credentials of the technology that is being used, or try this links:

Create your own Dictionaries

Find as much information about the target as you can and generate a custom dictionary. Tools that may help:

Crunch

Cewl

Generate passwords based on your knowledge of the victim (names, dates...)

Wordlists

Services

Ordered alphabetically by service name.

AFP

AJP

Cassandra

CouchDB

Docker Registry

Elasticsearch

FTP

HTTP Generic Brute

WFuzz****

HTTP Basic Auth

HTTP - Post Form

For https you have to change from "http-post-form" to "https-post-form"

HTTP - CMS -- (W)ordpress, (J)oomla or (D)rupal or (M)oodle

IMAP

IRC

ISCSI

JWT

LDAP

Mongo

MySQL

OracleSQL

In order to use oracle_login with patator you need to install:

Offline OracleSQL hash bruteforce (versions 11.1.0.6, 11.1.0.7, 11.2.0.1, 11.2.0.2, and 11.2.0.3):

POP

PostgreSQL

PPTP

You can download the .deb package to install from https://http.kali.org/pool/main/t/thc-pptp-bruter/

RDP

Redis

Rexec

Rlogin

Rsh

http://pentestmonkey.net/tools/misc/rsh-grind

Rsync

RTSP

SNMP

SMB

SMTP

SOCKS

SQL Server

SSH

Telnet

VNC

Winrm

Local

Online cracking databases

Check this out before trying to bruteforce a Hash.

ZIP

7z

PDF

JWT

NTLM cracking

Keepass

Keberoasting

Lucks image

Method 1

Install: https://github.com/glv2/bruteforce-luks

Method 2

Mysql

Tools

Hash examples: https://openwall.info/wiki/john/sample-hashes

Hash-identifier

John mutation

Read /etc/john/john.conf and configure it

Hashcat

Cracking Linux Hashes - /etc/shadow file

Cracking Windows Hashes

Cracking Common Application Hashes

Last updated