Password Guessing - Robertsegee/SEC335 GitHub Wiki
This week we tackled a lab that focused on brute-forcing passwords on an ssh client. Initially we were given hints about what the password could be, the way in which we were able to narrow down this list was by using the Cewl command. This would pull the info from the webpages and put it into a text file. The syntax is as follows:
cewl -d 1 http://(site) > (output file)
After the words were in the file, we deleted ones that did not relate to the hint that we were given, this left us with 4-10 words of what the password could contain. Then we used the rsmangler command. This command would generate a list of possible passwords by mangling the words with the given parameters. The syntax I used was:
rsmangler --file (txt file from cewl) -m 9 -x 12 -l -s -e -i -p -u -a -t > (output file)
Once we had a password list of mangled words I then used the hydra tool to try and brute force into the ssh, the syntax is as follows:
hydra -l (username of account you are trying to get into) -P (txt of mangled words) (ip of machine or site) -t 50 ssh
After running this I was able to successfully log into 3 of the 4 accounts