Editing
Password Attacks
Jump to navigation
Jump to search
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Password Attacks == Password attacks target authentication systems by attempting to gain access using valid or guessed credentials. These techniques play a central role in assessing the strength of user access controls, exposing weak password hygiene, misconfigurations, or lack of rate-limiting. Password-based authentication remains the most common form of access control, making it a recurring target for security assessments and enumeration strategies. === Goals === * Identify valid username and password pairs * Test authentication mechanisms for resilience * Bypass login portals or API authentication * Expose weak, reused, or default credentials === Common Techniques === * '''Brute-force attacks''' β systematically try all possible combinations. * '''Dictionary attacks''' β use wordlists of common or leaked passwords. * '''Credential stuffing''' β use known username/password pairs from breaches. * '''Password spraying''' β try a small set of passwords across many accounts. * '''Default credential testing''' β test common vendor defaults on devices and services. === Concepts === * '''Username enumeration''' β discovering valid usernames before attempting login. * '''Rate-limiting evasion''' β bypassing protections like CAPTCHAs, lockouts, and timeouts. * '''Multi-factor resistance''' β identifying systems lacking MFA or with weak fallback paths. * '''Authentication protocol abuse''' β targeting flaws in NTLM, RDP, SSH, or web auth flows. === Tools === ==== Username Enumeration & Preparation ==== * [[Username-Anarchy]] β generates realistic username lists from real-world names * [[Kerbrute]] β brute-forces and enumerates Kerberos accounts using username lists ==== Online Password Attacks (Network Protocols) ==== * [[Hydra]] β high-speed network login cracker supporting many protocols * [[Medusa]] β fast, parallel, and modular login brute-forcer * [[Ncrack]] β network authentication cracking tool from the Nmap team * [[Patator]] β multi-purpose brute-forcing tool with flexible module support * [[Crowbar]] β brute-force tool with support for RDP, SSH, and VNC ==== Post-Exploitation & Credential Validation ==== * [[CrackMapExec]] β post-exploitation and credential validation tool for Windows networks ==== Offline Password Cracking ==== * [[John the Ripper]] β offline password cracker for local hash files * [[Hashcat]] β GPU-accelerated password cracker for hashes (offline) === Wordlists & Resources === * [https://github.com/danielmiessler/SecLists SecLists] β extensive collection of wordlists for usernames, passwords, and URLs * [https://haveibeenpwned.com Have I Been Pwned] β check for breached credentials * [https://github.com/Flangvik/SharpCollection SharpCollection] β Windows-focused red team tools and password resources * [https://weakpass.com/ weakpass.com] β community-driven password dumps and dictionaries * [https://crackstation.net crackstation.net] β precomputed hash lookup tables and cracking tips === Common Targets === * '''SSH''' β brute-forcing port 22 * '''FTP''' β default credentials and weak password combinations * '''HTTP(S)''' β login forms, API tokens, and session-based auth * '''SMB / RDP''' β targeting exposed Windows services * '''Web CMS''' β WordPress, Joomla, Drupal admin panels * '''Routers & IoT''' β testing default credentials and vendor-specific backdoors === Defensive Indicators === * Sudden spike in failed login attempts * Auth logs showing repeated logins from single IP * Lockout or throttling mechanisms being triggered * Auth bypass via known default credentials === See Also === * [[Credential Dumping]] * [[Privilege Escalation]] * [[Initial Access]]
Summary:
Please note that all contributions to HackOps may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
HackOps:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Navigation menu
Personal tools
Not logged in
Talk
Contributions
Create account
Log in
Namespaces
Page
Discussion
English
Views
Read
Edit
Edit source
View history
More
Search
Navigation
Tools
What links here
Related changes
Special pages
Page information