当前位置:网站首页>Web penetration test - 5. Brute force cracking vulnerability - (5) SMB password cracking
Web penetration test - 5. Brute force cracking vulnerability - (5) SMB password cracking
2022-06-24 04:19:00 【Seven days】
List of articles
Communication protocol (Server Message Block:SMB) Mainly as Microsoft Network communication protocol .SMB It's at the session layer (session layer) And presentation layer (presentation layer) And a small number of application layers (application layer) The agreement .SMB Used NetBIOS The application program interface of . in addition , It's an open protocol , Protocol extensions are allowed . Default port :139、445.
One 、hydra
Hydra Is a parallel login cracker , It supports multiple attack protocols . It's very fast and flexible , And new modules are easy to add .kali Toolset integrated .
hydra Project address :
https://github.com/vanhauser-thc/thc-hydra/releases Full version
hydra Support :
Cisco AAA、Cisco auth、Cisco enable、CVS、FTP、HTTP(S)-FORM-GET、HTTP(S)-FORM-POST、HTTP(S)-GET、HTTP(S)-HEAD、HTTP- agent 、ICQ、IMAP、IRC、LDAP、MS-SQL、MySQL、NNTP、Oracle The listener 、Oracle SID、PC-Anywhere、PC-NFS、POP3、PostgreSQL、RDP、Rexec、Rlogin、Rsh、SIP、SMB(NT)、SMTP、SMTP enumeration、SNMP v1+v2+v3、SOCKS5、SSH(v1 and v2)、SSHKEY、Subversion、Teamspeak (TS2)、Telnet、VMware-Auth、VNC and XMPP`.
hydra -L /root/Desktop/user.txt -P /root/Desktop/pass.txt IP smb
-L: Specify the user name dictionary path-P: Specify password dictionary path
Two 、Ncrack
Ncrack Is a high-speed network authentication cracking tool . It aims to help companies protect their networks by proactively testing all their hosts and network devices for password errors .Ncrack Is to use a modular approach 、 Be similar to Nmap Command line syntax and dynamic engine design that can adjust its behavior according to network feedback . It allows fast and reliable large-scale auditing of multiple hosts .kali Toolset integrated .
Ncrack The functionality of the includes a very flexible interface , Allow users to have complete control over network operations , Allow very complex brute force attacks , Easy to use timing templates , Be similar to Nmap The runtime interaction of . Supported protocols include
SSH、RDP、FTP、Telnet、HTTP(S)、Wordpress、POP3(S)、IMAP、CVS、SMB、VNC、SIP、Redis、PostgreSQL、MQTT、MySQL、MSSQL、MongoDB、Cassandra、WinRM、OWA , and DICOM
Project address :
https://nmap.org/ncrack/
ncrack –U /root/Desktop/user.txt -P /root/Desktop/pass.txt IP –p 445
-U: Indicates the path to the user name list-P: Indicates the path to the password list
3、 ... and 、Medusa
Medusa It's a fast one 、 A parallel and modular login brute force cracker . The goal is to support as many services as possible that allow remote authentication .kalikali Toolset integrated .
file :
www.foofus.net/jmk/medusa/medusa.html
Source code :https://github.com/jmk-foofus/medusahttps://github.com/jmk-foofus/medusa/archive/2.2.tar.gz
The main functions are as follows :
1、Thread based parallel testing: It can target multiple hosts at the same time 、 The user or password performs a brute force test .
2、Flexible user input: Target information can be specified in a number of ways ( host / user / password ). for example , Each item can be a single item , It can also be a file that contains multiple entries . Besides , The combined file format allows users to refine their target list .
3、Modular design: Each service module acts as an independent .mod File exists . This means that the list of supported services can be extended for brute force cracking without any modification to the core application .
4、Support multiple protocols: Many services are currently supported ( for example SMB、HTTP、POP3、MS-SQL、SSHv2 etc. ).
medusa -h IP -U /root/Desktop/user.txt -P /root/Desktop/pass.txt -M smbnt
-U: Indicates the path to the user name list-P: Indicates the path to the password list-M: Specify the burst parameter type
Four 、Metasploit
use auxiliary/scanner/smb/smb_login
msf exploit (smb_login)>set rhosts IP
msf exploit (smb_login)>set user_file /root/Desktop/user.txt
msf exploit (smb_login)>set pass_file /root/Desktop/pass.txt
msf exploit (smb_login)>set stop_on_success true
msf exploit (smb_login)>exploit
边栏推荐
- Training course of mixed accuracy from simple to deep
- flutter系列之:flutter中的offstage
- 图书馆管理后台
- Understanding of structure in C language
- LeetCode 938. Range sum of binary search tree
- C string input considerations
- IDC, Youshang cloud data on cloud (COS) best practices
- How to be a web server and what are the advantages of a web server
- Clang代码覆盖率检测(插桩技术)
- Cloud development CMS Enterprise Edition demand survey
猜你喜欢

flutter系列之:flutter中的offstage

抢先报名丨新一代 HTAP 数据库如何在云上重塑?TiDB V6 线上发布会即将揭晓!

博士申请 | 香港科技大学(广州)刘浩老师招收数据挖掘方向全奖博士/硕士

Training course of mixed accuracy from simple to deep

Multi task video recommendation scheme, baidu engineers' actual combat experience sharing

Black hat SEO actual combat search engine snapshot hijacking

What is etcd and its application scenarios

Doctor application | Hong Kong University of science and Technology (Guangzhou) Mr. Liu Hao recruits the full award doctor / Master in data mining

编译器是如何将芯片执行的第一个指令放到芯片起始地址的?

Black hat SEO actual combat directory wheel chain generates millions of pages in batch
随机推荐
How to intuitively explain server hosting and leasing to enterprises?
Unable to access the CVM self built container outside the TKE cluster pod
Can the video streams of devices connected to easygbs from the intranet and the public network go through their respective networks?
应用实践 | Apache Doris 整合 Iceberg + Flink CDC 构建实时湖仓一体的联邦查询分析架构
web渗透测试----5、暴力破解漏洞--(5)SMB密码破解
2. in depth tidb: entry code analysis and debugging tidb
Student information management system user manual
Download files and close the enhanced module security configuration to visit the website for the first time using IE browser
Application practice | Apache Doris integrates iceberg + Flink CDC to build a real-time federated query and analysis architecture integrating lake and warehouse
Go operation mongodb
The use of char[0] and char[1] in C language structure
What is FTP? How does the ECS open the FTP protocol?
Abnova荧光原位杂交(FISH)探针解决方案
Through the fog: location notes of Flink crash with a multi component timeout
Structure size calculation of C language struct
How to identify information more quickly and accurately through real-time streaming media video monitoring?
Clang code coverage detection (pile insertion technology)
Why is on-line monitoring of equipment more and more valued by people?
脚本之美│VBS 入门交互实战
Abnova膜蛋白脂蛋白体解决方案