Password Attacks
Hints:
Default Credentials
Generate a dictionary based on the website company (CEWL tool) or OSINT techniques.
Before to credentials attack either Bruteforce or Password Spraying try to get the password policy.
Re-use credentials on everywhere (Services, Platforms ,users , software , apps, etc.)
User as password (Ex: James:James)
Simple Passwords (Password1, Welcome123)
Create a dictionary with hashcat rules
Google Search - Default Credentials

Default Router Login Password For Top Router Models (2024 List)
Hashcat
Hashcat rules
Default Path: /usr/share/hashcat/rules/
How to create rules: rule_based_attack
Example Hashcat file rules provided by Hackthebox
Mask attack table
?l
Lowercase letter
abcdefghijklmnopqrstuvwxyz
?u
Uppercase letter
ABCDEFGHIJKLMNOPQRSTUVWXYZ
?d
Digit
0123456789
?s
Special character
`!"#$%&'()*+,-./:;<=>?@[]^_{
?a
All characters (lowercase + uppercase + digits + special)
?b
All printable ASCII characters (includes space)
?h
Lowercase hex character
0123456789abcdef
?H
Uppercase hex character
0123456789ABCDEF
example.hcmask
Cracking using combinator attack in hashcat
Crafting Wordlists
Generating Wordlists Using CEWL
Generating Wordlists of Username Conventions using username-anarchy
Create a custom wordlist with a OSINT
Generate 16,679,616 possible username combinations.
Crafting wordlist using kwprocessor
Advanced keyboard-walk generator with configureable basechars, keymap and routes
Examples:


John the Ripper
Locate john converter scripts
Something to John
Keepass to John
Cracking examples
Putty ppk to SSH
Cracking BitLocker Encrypted Drives
Cracking OpenSSL Encrypted Archives
Hashes known
Hash identifier tools
Password Spraying Office 365 (Microsoft Exchange environment)
Last updated
