Carding 4 Carders
Professional
- Messages
- 2,724
- Reaction score
- 1,579
- Points
- 113
This article is presented for informational purposes only and does not carry a call to action. All information is aimed at protecting readers from illegal actions.
For brute-forcing attacks, we will use the Hydra tool, which is included in the Kali Linux distribution. SSH is present on any Linux or Unix server and is generally the primary way administrators use it to access and manage their systems.
Warning: Hydra is a tool for attacks
«Use it only on your own systems and networks, unless you have written permission from the owner. Otherwise, it is illegal.»
To implement the attack, use the command:
Now let's analyze it:
–s-Flag indicates the port. It is worth noting that administrators can replace the default port 22 for the ssh service. to find out which port the service is running on, you need to perform an initial scan of the target using the Nmap tool. We wrote about how to do this earlier in the article.
–l-flag indicates a username. in our example, we use root and admin. (we can provide a link to the dictionary here)
–P-flag indicates a password. in our case, we use a dictionary fasttrack.txt from the kali distribution, which is located in the /usr/share/wordlists directory/
It is worth noting that to effectively conduct a brute-force attack, you should pay due attention to preparing a dictionary, namely: take into account geographical and linguistic features, include the company name, the names of its subsidiaries, the names of operating services and applications, the names of employees, and so on.
192.168.1.1 is the target's ip address. since the target we are using has a white ip, it is smeared
–t-flag indicates the number of concurrent threads used. Point 4
ssh-the protocol used
Based on the results of the team's work, we can see that the passwords from the dictionary were not suitable for the admin and root logins
Conclusions
Hydra is a convenient and simple tool for testing SSH password policies.
The tool is able to view massive lists of usernames, passwords, and targets to check if you or a user is using a potentially vulnerable password.
Hydra has flexible customization, using its many flags for a number of different situations.
Ensuring the security of SSH passwords should be a top priority for any web user.
For brute-forcing attacks, we will use the Hydra tool, which is included in the Kali Linux distribution. SSH is present on any Linux or Unix server and is generally the primary way administrators use it to access and manage their systems.
Warning: Hydra is a tool for attacks
«Use it only on your own systems and networks, unless you have written permission from the owner. Otherwise, it is illegal.»
To implement the attack, use the command:
Code:
# hydra -s 22 -l root -P /usr/share/wordlists/fasttrack.txt 192.168.1.1 -t 4 ssh
Now let's analyze it:
–s-Flag indicates the port. It is worth noting that administrators can replace the default port 22 for the ssh service. to find out which port the service is running on, you need to perform an initial scan of the target using the Nmap tool. We wrote about how to do this earlier in the article.
–l-flag indicates a username. in our example, we use root and admin. (we can provide a link to the dictionary here)
–P-flag indicates a password. in our case, we use a dictionary fasttrack.txt from the kali distribution, which is located in the /usr/share/wordlists directory/
It is worth noting that to effectively conduct a brute-force attack, you should pay due attention to preparing a dictionary, namely: take into account geographical and linguistic features, include the company name, the names of its subsidiaries, the names of operating services and applications, the names of employees, and so on.
192.168.1.1 is the target's ip address. since the target we are using has a white ip, it is smeared
–t-flag indicates the number of concurrent threads used. Point 4
ssh-the protocol used
Based on the results of the team's work, we can see that the passwords from the dictionary were not suitable for the admin and root logins
Conclusions
Hydra is a convenient and simple tool for testing SSH password policies.
The tool is able to view massive lists of usernames, passwords, and targets to check if you or a user is using a potentially vulnerable password.
Hydra has flexible customization, using its many flags for a number of different situations.
Ensuring the security of SSH passwords should be a top priority for any web user.
