Module 19 (Password Attacks)

  • Wordlists

    • Rainbow table

    • Dictionary attack

    • Brute force Attack

    • Custom

Standard wordlist

using john

Brute Force Wordlists

Crunch

  • Using mimikatz:

    • Execute Pass The Hash Attack with mimikatz.

      Copy

  • Use the sekurlsa::pth command to pass the hash for privilege escalation.

Common Network Service Attack Methods

Table of Contents

  • AES

  • bkcrack

  • DonPAPI

  • fcrack

  • Group Policy Preferences (GPP)

  • Hash-Buster

  • hashcat

  • Hydra

  • John

  • Kerbrute

  • LaZagne

  • LUKS

  • Medusa

  • mimikatz

  • MultiDump

  • NetExec

  • Patator

  • PDFCrack

  • pypykatz

  • RsaCtfTool

  • Spray-Passwords

  • SprayingToolkit

  • VNC Password Recovery

AES

Cracking AES Encryption

Create AES File

Create String File

For Loop

bkcrack

Cracking .zip File

DonPAPI

https://github.com/login-securite/DonPAPI

fcrack

Group Policy Preferences (GPP)

gpp-decrypt

https://github.com/t0thkr1s/gpp-decrypt

Hash-Buster

https://github.com/s0md3v/Hash-Buster

hashcat

https://hashcat.net/hashcat/

https://hashcat.net/wiki/doku.php?id=hashcat

https://hashcat.net/cap2hashcat/

https://hashcat.net/wiki/doku.php?id=example_hashes

Common Commands

Hash Rules

Custom Rules

https://hashcat.net/wiki/doku.php?id=rule_based_attack

Add a 1 to each Password

Capitalize first character

Add nothing, a 1 or a ! to an existing Wordlist

Rule for upper case Letter, numerical Value and special Character

  • $1 > appends a "1"

  • $2 > appends a "2"

  • $3 > appends a "3"

  • c > Capitalize the first character and lower case the rest

Rule Preview

Mask File Example

https://hashcat.net/wiki/doku.php?id=mask_attack

example.hcmask

Cracking ASPREPRoast Password File

Cracking Kerberoasting Password File

Bruteforce based on the Pattern

Generate Password Candidates: Wordlist + Pattern

Generate NetNLTMv2 with internalMonologue and crack with hashcat

Result

Crack with hashcat

Rules

https://github.com/NotSoSecure/password_cracking_rules/blob/master/OneRuleToRuleThemAll.rule

Cracking with OneRuleToRuleThemAll.rule

Hydra

https://github.com/vanhauser-thc/thc-hydra

Common Commands

Proxy

SSH

FTP

SMB

MySQL

Postgres

Telnet

VNC

Docker Registry

Webform

HTTP POST Attack with Hydra

John

https://github.com/openwall/john

Show cracked Password

Using Salt

Cracking .zip-Files

Cracking EncFS/6

Cracking Kerberoasting Password File

Cracking RSA

Cracking yescrypt

Extracting Hash from .kdbx File

Kerbrute

https://github.com/ropnop/kerbrute

User Enumeration

Password Spray

LaZagne

https://github.com/AlessandroZ/LaZagne

LUKS

Extracting LUKS Header

Medusa

mimikatz

https://github.com/gentilkiwi/mimikatz

Common Commands

Execute mimikatz Inline

This is helpful when executing within a Evil-WinRM session.

Dump Hashes

Overpass-the-hash / Pass-the-Key

RC4

AES128

AES256

Pass the Ticket

Forging Golden Ticket

Skeleton Key

Data Protection API (DPAPI) Decryption

https://github.com/gentilkiwi/mimikatz/wiki/howto-~-credential-manager-saved-credentials

rpc

MultiDump

https://github.com/Xre0uS/MultiDump

NetExec

https://github.com/Pennyw0rth/NetExec

Installation via Poetry

Modules

Common Commands

Patator

https://github.com/lanjelot/patator

PDFCrack

pypykatz

https://github.com/skelsec/pypykatz

RsaCtfTool

https://github.com/Ganapati/RsaCtfTool

Spray-Passwords

Spray-Passwords.ps1

Usage

SprayingToolkit

https://github.com/byt3bl33d3r/SprayingToolkit

OWA

VNC Password Recovery

NTLM

  • Lateral Movement:

    • Pass the hash attack (PtH)

Last updated