Password Attacks

Hints:

  • Default Credentials

  • Generate a dictionary based on the website company (CEWL tool) or OSINT techniques.

  • Before to credentials attack either Bruteforce or Password Spraying try to get the password policy.

  • Re-use credentials on everywhere (Services, Platforms ,users , software , apps, etc.)

  • User as password (Ex: James:James)

  • Simple Passwords (Password1, Welcome123)

  • Create a dictionary with hashcat rules

Google Search - Default Credentials

Default Router Login Password For Top Router Models (2024 List)

Hashcat

Hashcat rules

Default Path: /usr/share/hashcat/rules/

How to create rules: rule_based_attack

Example Hashcat file rules provided by Hackthebox

Mask attack table

Placeholder
Meaning
Character Set

?l

Lowercase letter

abcdefghijklmnopqrstuvwxyz

?u

Uppercase letter

ABCDEFGHIJKLMNOPQRSTUVWXYZ

?d

Digit

0123456789

?s

Special character

`!"#$%&'()*+,-./:;<=>?@[]^_{

?a

All characters (lowercase + uppercase + digits + special)

?b

All printable ASCII characters (includes space)

?h

Lowercase hex character

0123456789abcdef

?H

Uppercase hex character

0123456789ABCDEF

example.hcmask

Cracking using combinator attack in hashcat

Crafting Wordlists

Generating Wordlists Using CEWL

Generating Wordlists of Username Conventions using username-anarchy

Create a custom wordlist with a OSINT

Generate 16,679,616 possible username combinations.

Crafting wordlist using kwprocessor

Advanced keyboard-walk generator with configureable basechars, keymap and routes

Examples:

John the Ripper

Locate john converter scripts

Something to John

Keepass to John

If you get the next error: File version '40000' is currently not supported! then use Keepass4Brute.sh or findkeepassword

Cracking examples

Putty ppk to SSH

Cracking BitLocker Encrypted Drives

Cracking OpenSSL Encrypted Archives

Hashes known

Hash identifier tools

Password Spraying Office 365 (Microsoft Exchange environment)

Last updated