Username / Password attacks
Identify the hash
You can identify the hash with tools such as:
hash-identifier
hashid <hash>Get hash type
hashcat --help | grep -i "<INPUT>"Password list generation
If you have part of password you can generate it's variations using crunch.
You have to specify minimum length, maximum length and pattern.
% = additional generated letter
crunch 6 6 -t <any_word>%%% > wordlistRegular Brute-Force
After choosing the wordlist we can move on to the Hydra tool which will help us in performing the attack.
SSH
Password Brute Force:
RDP
Username Brute-Force:
HTTP
Password Brute-Force [POST]:
Password Managers
Search for password managers in windows apps. Once you will identify password manager on the system search for password's manager database file.
KeePass example:
Also look for configuration files:
Transforming the hash into a format our cracking tool can use
Then we can run hashcat
SSH Private Key
You can bruteforce private keys for ssh using John the Ripper.
Create rule:
Add rule to john config:
Transform id_rsa into hash
Attack:
Rule based attack (Hashcat)
Add rule to the file with rules:
Show attack preview in hashcat debug mode:
After debug hashcat can be run:
Hashcat mode id: https://hashcat.net/wiki/doku.php?id=example_hashes
NTLM
You can dump the NTLM hashes using mimikatz as Administrator when you have SeDebugPrivilege access enabled:
We can also become the SYSTEM with SeImpersonatePrivilege access in order to get access to the hashes.
First we check for SeDebugPrivilege:
We are able to elevate with the following command:
We can extract passwords using the following:
Cracking
Passing
Scan with NetExec / SMBExec [Pass the hash]:
Connecting to the server [Connection]:
Useful commandsNTLMv2
You can get NTLMv2 hashes with responder when the target server reaches to us:
Grab it with this command:
Or using file upload:
Cracking
Relaying
MD5
Also use https://crackstation.net.
Last updated