πŸ’‘
cheatsheets
  • πŸ‘‹Introduction
  • πŸ‹Docker
  • πŸ’ͺBrute Force
    • Hydra
  • πŸ—οΈCryptography
    • Generate pub/priv key
  • 🐧Linux
    • Curl
    • Debian
    • Fail2Ban
    • Find
    • Grep & Co
    • Netstat
    • ps
    • pdfcrack
    • qpdf
    • Rsync
    • Scp
    • Tmux
    • Ufw
    • Vim
  • 🐍Python
    • Files Handling
    • Web
  • πŸ‘οΈRecon
    • Cewl
    • DNS
    • Host Discovery
    • nmap
    • Web
  • πŸ”Splunk
    • tstats
  • πŸ“‘SSH
  • πŸ•ΈοΈWeb
    • Gobuster
    • OWASP
    • SQLi
      • Resources
  • ⛏️Resources
    • πŸ“‘Cheatsheets
    • πŸ‹οΈTrainings
Powered by GitBook
On this page
  • Hydra
  • Global Options
  • SSH
  • Web Form
  • FTP
  • MySQL
  • RDP
  • Curl
  • Basic Auth
  • subEnum

Brute Force

Hydra

Global Options

-l : user -L : a list of users`` file -p : password -P : a list of passwords`` file -t : nb of tasks per target (default: 16) -o : output file -b : specify the format for the -o file (default: txt) -f : exit when a login/pwd is found -M : a list of hosts`` file ``-I : ignore an existing restore file -R: restore an aborted session. Requires an hydra.restore file. Options can be changed by setting them after -R -S : connect via SSL -u : do all users for 1 password instead of all password for each user. -c : the wait time by second per login attempt

Supported services: adam6500 afp asterisk cisco cisco-enable cvs firebird ftp ftps http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] mssql mysql(v4) mysql5 ncp nntp oracle oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres rdp radmin2 redis rexec rlogin rpcap rsh rtsp s7-300 sapr3 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmpp

SSH

hydra -l john -P list.txt target_ip ssh

Web Form

hydra -L userlist.txt -P pwdlist.txt 192.168.10.10 http-form-get "/login:user=^USER^&password=^PASS^:Failed" -t 8 -o results.txt

FTP

hydra -l john -P list.txt target_ip ftp

MySQL

hydra -l john -P list.txt target_ip mysql

RDP

hydra -l john -P list.txt rdp://target_ip

Curl

Basic Auth

curl -v -X GET 'http://target.com/login?username=admin&password=password'

subEnum

./subenum.py -w subnames.txt -d hackthissite.com

PreviousDockerNextHydra

Last updated 1 year ago

πŸ’ͺ
GitHub - itsKindred/subEnum: Small Python script used to bruteforce subdomain names of a specified domain.GitHub
Logo