Password Attacks - EH-04-P1 Flashcards
A tool that supports many remote protocols and web format logins
it continously attacks while the server sends an access denied response
basic flags include:
-I [user name]
-P [path to wordlist] [IP]:[Port]
Hydra
creates a wordlist based on words victims may use
Social engineering on the victim may help the attacker build the list
The victim may use an easy-to-remember password based on personal information
Cupp
was originally CPU-based
takes advantage of CPU
John the Ripper
Uses Brute-force to crack RAR, PDF, and ZIP files
It creates or uses a wordlist file for its cracking attempts
Rar2john [filedname] > hast.txt
Zip2John [filename] > hash.txt
Rar2John
A thread-based remote authentication cracking tool
Supports parallel connections
Supports the same protocols as Hydra but operates more slowly
Medusa
Cross-platform tool claimed to be the fastest password cracking utility
supports both CPU and GPU
HashCat
The fastest and most
reliable tool for remote
authentication
Ncrack