password, brute forcing tips are learning objective is to describe some useful tips when trying to brute force protocols and web services.
So you saw what I did on that Wordpress site, I put a user in there. I want to see the different responses between a user I knew and the user I didn't.
But some Wordpress sites will lock you out after maybe three wrong attempts at a user name and password. So check the response when you enter something and it's incorrect and it says you have x amount of times before you were locked out of that service, in which case is not a good idea to brute force that password username and password,
you're gonna get locked out and you can't do it ever again.
Or it can block you for a certain length of time, maybe an hour, maybe a day.
So be aware of that. The other thing is a test between hydra and crack and Medusa
showed, and crack was the fastest. Now that's good to know. You could be very proficient within crack. I think it's better to know a particular one of these tools really well, get to know each of them. But you know, I, I always default to hydra. Hydra is the one that I feel most comfortable with and I like.
So it's good to know that in crack was the fastest, but I've had a lot of success with hydra. So that's usually my go to tool.
So that is going to determine your success. I always go and say rocky dot txt. There are other ones you can use that are more targeted rather than waiting, you know, days for rock you to to find the correct password. There are lists already in Cali under, users share word lists.
Um, also you can create a custom word list you saw me use Cool. Um, to kind of hone in because I knew that person liked turtles to kind of hone in on
which words might be the correct one for their password.
So be mindful that word lists can really make or break you and determine how quickly you find a password.
So is it worth waiting hours? Um,
you know, in the labs and things like that,
let's just say, you know, I would start a tool and, and hope that it would work and after, you know, seven hours of it not working, it's probably not gonna work. You probably won't find the correct username and password.
So be aware of that. And also be aware of the stress it puts on the box.
If you're hammering a web server with thousands of requests, um, you may Dossett and you can't use that service.
So be aware. And this is of course true for the labs. Right. The labs are a shared environment.
So if you were running a tool on a box
and you're sending thousands of requests, you could be discussing that service for somebody else.
So let's go do a demo.
So I've come across this website 1921681222
and it has basic authentication. So
they will ask me for a user name and password. I don't know what that is. I can try to enumerate users on this box by doing a few different things.
So what I want to do is I want to use End Map and I've already determined that
s uh simple network management Protocol S N M. P. Is enabled here.
So I'm gonna do End map. S you notice summary routes. So I don't need to do Sudo port 161 sc. This didn't do the default the default scripts
And let's see what we get.
We should get a list of users
And we do we have admin administrator, guest, E user, S, S, H D. S safety server
you can also do that with S and M. P. Walk.
You need to know the oh I'd string which I googled to get the users.
So I said and it's an S and M. P. Walk had a very verbose output. But if you specify the oh I D like I did here I can see I have what different users on this box. This will help me hone in on brute forcing. The other thing that you can do with basic authentication
is use End Map again. This is why you see I use End Map a lot. It's very versatile.
Somebody you script. HDP brute port 81 921681222 Very very very verbose.
And we'll see if that successfully brute force is the login.
Now there are the I'm going to also use N crack hydrogen Medusa
on this basic off page. In addition to End map and we can compare all the different tools.
So right now is trying combinations of boo. That was fast.
So we see it found admin Hunter an admin. I love you and that Nice. We can do that with N crack.
So I'm gonna specify a specific user. In this case
we can of course create a user list.
But N crack is m http you as user P is our password list. Rock you
F. Will make it stop upon success.
So if we're right up there, Hunter,
yep. We see Hunter is the password.
Okay, let's try Hydro. Now,
I'm gonna try hydra on the user admin.
So hydra admin we're using Rock you again
using HP. Head request an index at html.
So and I've already found it. But I just want to show you the different tools here
and it found login. Admin password. I love you.
All right, let's give the Medusa a try.
So, we know we have I. E. User
I user. This is a custom password list that I'm using now.
Just because it's not. I know that if I ran this in Rocky would take a very long time.
So I see that it found I user and password of this weird password here.
So those are the outputs of the three different tools. Now let's log in. I eat user.
We'll use this password.
Let's try this again.
we have a password. My mouse isn't working.
Okay now what do we see
first? We see him a pretty bad web web developer because I just made this basic page here. Congrats you have bypassed basic authentication, bank safe passwords,
bank safe password list. So I click here and I see all these banks safe passwords.
and all through these in here.
Now I can use hash ID on this.
and see what it says
and I see that it doesn't know the hash probably because this is bank safe in here. So I can also do
Paste one of these hashes and tells me that it's a shot. 5 12.
So I will get out of here.
And now I want to use john
And because I know what it is. I want to specify that I wanna do format equals raw shot 5 12
and we see it cracked all of them. We have to perform a dragon snoopy and summer. So we've cracked all of these.
So, let's try these tools on some other protocols. Let's try them on SMB and see what happens. I want to try hydra
on I user with our custom password list. We're gonna do SMB want to see what happens, cracks it very easily there.
Now let's try Medusa.
I had to do S. M S M B N. T. Here and have to stop on success.
They're here you go. Admin. I love you.
And we'll try and crack on SMB.
You'll notice on end crack. I specify the port
There's also telnet enabled on this box. And the one tool that I found that worked is Hydro maybe you know why I'm partial Hydro's. I've just had so much success with it.
So let's try this now. It will actually warn you
says telnet by its nature is unreliable. So choose FTP or Ssh etcetera if available.
So if we do find a username or password that works, we could try that until now tell Net.
But if we don't have those options, all we have is telnet,
then I'll put my money on hydra.
All right. So we see it found the correct password for telnet.
It may take a really long time.
tell that's great because
it allows us to have full access to this box
and there you go. Get your command prompt there.
So now you've seen a few different tools and how to brute force different protocols and also how to crack some passwords,
I should say with johN if I didn't specify the shock value,
that would also take a very, very, very long time to crack. So it's worth it to specify a format
by identifying the hash value there.
So in summary, we should now be able to describe some useful tips when trying to brute force protocols and web services.