Brute Force - CheatSheet
Wait a second, have you tried to use default credentials??
Search in google for default credentials of the technology that is being used, or try this links:
****https://www.cirt.net/passwords****
Service
Ordered alphabetically by service name.
AFP
nmap -p 548 --script afp-brute <IP>msf> use auxiliary/scanner/afp/afp_loginmsf> set BLANK_PASSWORDS truemsf> set USER_AS_PASS truemsf> set PASS_FILE <PATH_PASSWDS>msf> set USER_FILE <PATH_USERS>msf> runAJP
nmap --script ajp-brute -p 8009 <IP>Cassandra
CouchDB
FTP
HTTP Generic Brute
HTTP Basic Auth
HTTP - Post Form
For https you have to change from "http-post-form" to "https-post-form"
HTTP - CMS -- (W)ordpress, (J)oomla or (D)rupal or (M)oodle
IMAP
IRC
ISCSI
LDAP
Mongo
MySQL
OracleSQL
In order to use oracle_login with patator you need to install:
Offline OracleSQL hash bruteforce (versions 11.1.0.6, 11.1.0.7, 11.2.0.1, 11.2.0.2, and 11.2.0.3):
POP
PostgreSQL
PPTP
RDP
Redis
Rexec
Rlogin
Rsh
http://pentestmonkey.net/tools/misc/rsh-grind
Rsync
RTSP
SNMP
SMB
SMTP
SQL Server
SSH
Telnet
VNC
Local
Online cracking databases
https://www.onlinehashcrack.com/ (Hashes, WPA2 captures, and archives MSOffice, ZIP, PDF...)
https://gpuhash.me/ (Hashes and file hashes)
https://hashkiller.co.uk/Cracker (MD5, NTLM, SHA1, MySQL5, SHA256, SHA512)
Check this out before trying to bruteforce a Hash.
Generic
Hash-identifier
John
unshadow
ZIP
7z
PDF
JWT
NTLM cracking
Keepass
Lucks image
Method 1
Install: https://github.com/glv2/bruteforce-luks
Method 2
Mysql
Hash examples: https://openwall.info/wiki/john/sample-hashes
Hash-identifier
Crunch
Cewl
John mutation
Read /etc/john/john.conf and configure it
Hashcat
Cracking Linux Hashes - /etc/shadow file
Cracking Windows Hashes
Cracking Common Application Hashes
Last updated
Was this helpful?