🔐Password Attacks
Username Custom Wordlist
Username list can be made with username-anarchy
Bruteforcing WebApps
When a website needs to be bruteforced with login use cewl to make a wordlist:
Then use it with hydra
Normal:
Here Login failed. Invalid
is the string it greps for to know the login is not successful.
fm_user
is the parameter
Base64:
JohnTheRipper
To crack a hash:
Tool | Description |
| Converts PDF documents for John |
| Converts SSH private keys for John |
| Converts MS Cash hashes for John |
| Converts OS X keychain files for John |
| Converts RAR archives for John |
| Converts PKCS#12 files for John |
| Converts TrueCrypt volumes for John |
| Converts KeePass databases for John |
| Converts VNC PCAP files for John |
| Converts PuTTY private keys for John |
| Converts ZIP archives for John |
| Converts WPA/WPA2 handshake captures for John |
| Converts MS Office documents for John |
| Converts WPA/WPA2 handshakes for John |
To mutate the password:
If /etc/passwd file is editable then delete the "x" in it
Algorithm Types
$1$
– MD5$2a$
– Blowfish$2y$
– Eksblowfish$5$
– SHA-256$6$
– SHA-512
\
Last updated