Pentest Tips
  • ABOUT
  • Information Shares
  • CTF
    • Stego
    • Memory
  • Blue Team
    • Tools/Resources
    • One Liners
    • Threat Hunting
    • Scripts
    • Intrusion
  • Web
    • Resources
    • General Web
    • Subdomain Discovery
    • Content Discovery
    • MYSQL
    • Burpsuite
  • Network Exploitation
    • Resources
    • Kerberos
    • Network Based
    • Phishing
    • Metasploit
    • Weaponization
    • Password Cracking
    • Shell Upgrades
    • Linux PrivEsc
    • Windows PrivEsc
    • Windows Persistence
    • Exfiltration
  • Windows Internals
    • Kernal
  • Recon
    • Nmap
    • OSINT
    • SMB Enumeration
    • LDAP
    • Physical
  • Malware
    • Obfuscation
  • Scripting
    • Bash Basics
    • Powershell Basics
  • Cloud
    • AWS
  • Game Hacking
    • Resources
Powered by GitBook
On this page
  • Default Creds
  • Building words lists
  • John Custom word lists
  • Brute forcing tools
  • Windows Hashdump
  • Cracking NTLMv2-SSP
  • Wifi Hacking
  • Protocols to target
  • General advice
Edit on GitHub
  1. Network Exploitation

Password Cracking

PreviousWeaponizationNextShell Upgrades

Last updated 2 years ago

Default Creds

Building words lists

Use content from webpages to build a dictionary. This can include company pages, Facebook, twitter, and any other resource gathered when doing OSINT on the target. To grab all words from a page, Use Cewl.

Password Manglers:

Building Wordlists:

# Grab words form a site
cewl https://example.com -v --with-numbers -w words.txt

# Password Mangeling, High storage cost for longer lists.
python pydictor.py -extend words.txt --leet 0 1 2 11 21 --level 1 --len 4 16 --occur "<=10" ">0" "<=2" -o /possbile/wordlist.lst

# This will create a multiple GB file. You dont have the storage. 
./rsmangler.rb words.txt -yieulcp

John Custom word lists

# Edit the john.conf to adda new rule
vim /opt/john/john.conf

# Adds a year from 1900 to 2099 followd by a special char to each word
[List.Rules:YearSpecialChar]
Az"19[0-9][0-9]"$[!@#$%^&*]
Az"20[0-9][0-9]"$[!@#$%^&*]

# Build the list 
john --wordlist=words.lst --rules=YearSpecialChar --stdout > withYearAndChar.txt

Brute forcing tools

Hydra:

hydra -l <username> -P <LIST> <ip> <Protocol>

when bruteforcing SSH, you need to specify a timing interval:

hydra -l <username> -P <LIST> <ip> ssh -t4

John to crack windows hashdump:

john --format=NT <hashes.txt> --wordlist=<wordlist.txt>
john --show --fromat=LM <hashfile.txt>

John to crack /etc/shadow

# Create a txt file for /etc/passwd and shadow
cp /etc/passwd passwd.txt
cp /etc/shadow shadow.txt

# Unshadow 
unshadow passwd.txt shadow.txt > unshadowed.txt

# Crack with john 
john --wordlist=/usr/share/wordlists/rockyou.txt unshadowed.txt

Windows Hashdump

./mimikatz.exe
privilege::debug
lsadump::lsa /patch

hashcat -m 1000 f4ab68f27303bcb4024650d8fc5f973a rockyou.txt

Cracking NTLMv2-SSP

hashcat -m 5600 hash.txt /usr/share/wordlists/rockyou.txt 

Wifi Hacking

# Convert PCAP to hashcat: https://hashcat.net/cap2hashcat/index.pl
hashcat -m 22000 file.hc22000 wordslist.txt

Protocols to target

Protocols: telnet, smtp, http, https, smb, rpc, rdp, pop, sql.

Easy ports to hit: 20-23, 25, 80, 443, 135, 139.

General advice

  • Specify speed when bruteforcing SSH or you will hit a wall quickly. Using hydra, this is done using the T4 parameter.

  • Stop after gaining access to one account. Try its creds on everything, and use its creds for further enumeration. Never forget to try sudo -i for easy escalation.

  • Always take a look around the host machines file system when possible. potential low hanging fruit for enumeration. EX: Local user list at /etc/passwd.

  • Never crack hashes on target machine. Speed and stealth will be abysmal.

Burpsuite (intruder):

Hydra:

https://cirt.net/passwords
https://default-password.info/
https://datarecovery.com/rd/default-passwords/
https://github.com/ohmybahgosh/RockYou2021.txt
RSMangler
Crunch
pydictor
https://portswigger.net/burp
https://github.com/vanhauser-thc/thc-hydra
Identify Hash type