🌄
Shikata Ga Nai
  • Shikata Ga Nai
  • General
  • Gaining Access
    • Nmap
    • Reverse Shell
    • Password Cracking
    • Other Services
      • 21 - FTP
      • Enumerating SMB
    • Web
      • Web Enumeration
      • XSS
      • File Inclusion
      • SQL Injection
  • Linux Foothold
    • Linux Tricks
    • Privesc
  • Windows Foothold
    • Privesc
  • Binary
    • Calling Conventions
    • Debuggers
    • Examining Binaries
    • Shellcoding
    • Bypassing Exploit Mitigation Techniques [Linux]
  • Stego
    • Stego tools
Powered by GitBook
On this page
  • Wordlist Generation
  • Crackers
  • Hydra
  • Online Hash Crackers

Was this helpful?

  1. Gaining Access

Password Cracking

PreviousReverse ShellNextOther Services

Last updated 4 years ago

Was this helpful?

Look for default credentials to the program you are trying to breach.

Wordlist Generation

Cewl

A crawler that gathers words that can be used for password cracking. Example usage:

cewl <URL> -m 8 -w <OUTPUT_FILE>

-m Minimum word length, default 3.

Crackers

Hydra

A very fast network logon cracker which supports many different services.

Cracking web-forms

hydra -L <User List> -P <Password List> <IP> http-post-form "<Path to Page>:<Username Field>=^USER^&<Password Field>=^PASS^:<Failure Message>"

Online Hash Crackers

CrackStation