Brute Force - CheatSheet
Default Credentials
Search in google for default credentials of the technology that is being used, or try this links:
****https://www.cirt.net/passwords****
Create your own Dictionaries
Find as much information about the target as you can and generate a custom dictionary. Tools that may help:
Crunch
Cewl
Generate passwords based on your knowledge of the victim (names, dates...)
Wordlists
Services
Ordered alphabetically by service name.
AFP
AJP
Cassandra
CouchDB
Docker Registry
Elasticsearch
FTP
HTTP Generic Brute
WFuzz****
HTTP Basic Auth
HTTP - Post Form
For https you have to change from "http-post-form" to "https-post-form"
HTTP - CMS -- (W)ordpress, (J)oomla or (D)rupal or (M)oodle
IMAP
IRC
ISCSI
JWT
LDAP
Mongo
MySQL
OracleSQL
In order to use oracle_login with patator you need to install:
Offline OracleSQL hash bruteforce (versions 11.1.0.6, 11.1.0.7, 11.2.0.1, 11.2.0.2, and 11.2.0.3):
POP
PostgreSQL
PPTP
You can download the .deb package to install from https://http.kali.org/pool/main/t/thc-pptp-bruter/
RDP
Redis
Rexec
Rlogin
Rsh
http://pentestmonkey.net/tools/misc/rsh-grind
Rsync
RTSP
SNMP
SMB
SMTP
SOCKS
SQL Server
SSH
Telnet
VNC
Winrm
Local
Online cracking databases
http://hashtoolkit.com/reverse-hash?(MD5 & SHA1)https://www.onlinehashcrack.com/ (Hashes, WPA2 captures, and archives MSOffice, ZIP, PDF...)
https://crackstation.net/ (Hashes)
https://md5decrypt.net/ (MD5)
https://gpuhash.me/ (Hashes and file hashes)
https://hashes.org/search.php (Hashes)
https://www.cmd5.org/ (Hashes)
https://hashkiller.co.uk/Cracker (MD5, NTLM, SHA1, MySQL5, SHA256, SHA512)
Check this out before trying to bruteforce a Hash.
ZIP
7z
PDF
JWT
NTLM cracking
Keepass
Keberoasting
Lucks image
Method 1
Install: https://github.com/glv2/bruteforce-luks
Method 2
Mysql
Tools
Hash examples: https://openwall.info/wiki/john/sample-hashes
Hash-identifier
John mutation
Read /etc/john/john.conf and configure it
Hashcat
Cracking Linux Hashes - /etc/shadow file
Cracking Windows Hashes
Cracking Common Application Hashes
Last updated