Brute Force - CheatSheet

Wait a second, have you tried to use default credentials??

Search in google for default credentials of the technology that is being used, or try this links:

Service

Ordered alphabetically by service name.

AFP

nmap -p 548 --script afp-brute <IP>msf> use auxiliary/scanner/afp/afp_loginmsf> set BLANK_PASSWORDS truemsf> set USER_AS_PASS truemsf> set PASS_FILE <PATH_PASSWDS>msf> set USER_FILE <PATH_USERS>msf> run

AJP

nmap --script ajp-brute -p 8009 <IP>

Cassandra

CouchDB

FTP

HTTP Generic Brute

HTTP Basic Auth

HTTP - Post Form

For https you have to change from "http-post-form" to "https-post-form"

HTTP - CMS -- (W)ordpress, (J)oomla or (D)rupal or (M)oodle

IMAP

IRC

ISCSI

LDAP

Mongo

MySQL

OracleSQL

In order to use oracle_login with patator you need to install:

Offline OracleSQL hash bruteforce (versions 11.1.0.6, 11.1.0.7, 11.2.0.1, 11.2.0.2, and 11.2.0.3):

POP

PostgreSQL

PPTP

RDP

Redis

Rexec

Rlogin

Rsh

http://pentestmonkey.net/tools/misc/rsh-grind

Rsync

RTSP

SNMP

SMB

SMTP

SQL Server

SSH

Telnet

VNC

Local

Online cracking databases

Check this out before trying to bruteforce a Hash.

Generic

Hash-identifier

John

unshadow

ZIP

7z

PDF

JWT

NTLM cracking

Keepass

Lucks image

Method 1

Install: https://github.com/glv2/bruteforce-luks

Method 2

Mysql

Hash examples: https://openwall.info/wiki/john/sample-hashes

Hash-identifier

Crunch

Cewl

John mutation

Read /etc/john/john.conf and configure it

Hashcat

Cracking Linux Hashes - /etc/shadow file

Cracking Windows Hashes

Cracking Common Application Hashes

Last updated

Was this helpful?