Brute Force - CheatSheet

Do you use Hacktricks every day? Did you find the book very useful? Would you like to receive extra help with cybersecurity questions? Would you like to find more and higher quality content on Hacktricks? Support Hacktricks through github sponsorsarrow-up-right so we can dedicate more time to it and also get access to the Hacktricks private group where you will get the help you need and much more!

If you want to know about my latest modifications/additions or you have any suggestion for HackTricks or PEASS, join the 💬arrow-up-righttelegram grouparrow-up-right, or follow me on Twitter 🐦arrow-up-right@carlospolopmarrow-up-right. If you want to share some tricks with the community you can also submit pull requests to https://github.com/carlospolop/hacktricksarrow-up-right that will be reflected in this book and don't forget to give ⭐ on github to motivate me to continue developing this book.

Default Credentials

Search in google for default credentials of the technology that is being used, or try this links:

Create your own Dictionaries

Find as much information about the target as you can and generate a custom dictionary. Tools that may help:

Crunch

Cewl

Generate passwords based on your knowledge of the victim (names, dates...)

Wordlists

Services

Ordered alphabetically by service name.

AFP

AJP

Cassandra

CouchDB

Docker Registry

Elasticsearch

FTP

HTTP Generic Brute

HTTP Basic Auth

HTTP - Post Form

For https you have to change from "http-post-form" to "https-post-form"

HTTP - CMS -- (W)ordpress, (J)oomla or (D)rupal or (M)oodle

IMAP

IRC

ISCSI

JWT

LDAP

Mongo

MySQL

OracleSQL

In order to use oracle_login with patator you need to install:

Offline OracleSQL hash bruteforcearrow-up-right (versions 11.1.0.6, 11.1.0.7, 11.2.0.1, 11.2.0.2, and 11.2.0.3):

POP

PostgreSQL

PPTP

You can download the .deb package to install from https://http.kali.org/pool/main/t/thc-pptp-bruter/arrow-up-right

RDP

Redis

Rexec

Rlogin

Rsh

http://pentestmonkey.net/tools/misc/rsh-grindarrow-up-right

Rsync

RTSP

SNMP

SMB

SMTP

SOCKS

SQL Server

SSH

Telnet

VNC

Winrm

Local

Online cracking databases

Check this out before trying to bruteforce a Hash.

ZIP

7z

PDF

JWT

NTLM cracking

Keepass

Keberoasting

Lucks image

Method 1

Install: https://github.com/glv2/bruteforce-luksarrow-up-right

Method 2

Another Luks BF tutorial: http://blog.dclabs.com.br/2020/03/bruteforcing-linux-disk-encription-luks.html?m=1arrow-up-right

Mysql

PGP/GPG Private key

Hash examples: https://openwall.info/wiki/john/sample-hashesarrow-up-right

Hash-identifier

John mutation

Read /etc/john/john.conf and configure it

Hashcat

Cracking Linux Hashes - /etc/shadow file

Cracking Windows Hashes

Cracking Common Application Hashes

Last updated

Was this helpful?