🔐Password Attacks
Username Custom Wordlist
Username list can be made with username-anarchy
Bruteforcing WebApps
When a website needs to be bruteforced with login use cewl to make a wordlist:
Then use it with hydra
Normal:
Here Login failed. Invalid
is the string it greps for to know the login is not successful.
fm_user
is the parameter
Base64:
JohnTheRipper
To crack a hash:
Tool
Description
pdf2john
Converts PDF documents for John
ssh2john
Converts SSH private keys for John
mscash2john
Converts MS Cash hashes for John
keychain2john
Converts OS X keychain files for John
rar2john
Converts RAR archives for John
pfx2john
Converts PKCS#12 files for John
truecrypt_volume2john
Converts TrueCrypt volumes for John
keepass2john
Converts KeePass databases for John
vncpcap2john
Converts VNC PCAP files for John
putty2john
Converts PuTTY private keys for John
zip2john
Converts ZIP archives for John
hccap2john
Converts WPA/WPA2 handshake captures for John
office2john
Converts MS Office documents for John
wpa2john
Converts WPA/WPA2 handshakes for John
To mutate the password:
If /etc/passwd file is editable then delete the "x" in it
Algorithm Types
$1$
– MD5$2a$
– Blowfish$2y$
– Eksblowfish$5$
– SHA-256$6$
– SHA-512
\
Last updated