Cloud GCP Network
Cloud GCP Network
Cloud GCP Network
Cracking Tools
Introduction
A well-designed password-based authentication system doesn’t store a
user’s actual password.
This would make it far too easy for a hacker or a malicious insider to
gain access to all of the user accounts on the system.
Instead, authentication systems store a password hash, which is the
result of sending the password — and a random value called a salt —
through a hash function.
Hash functions are designed to be one-way, meaning that it is very
difficult to determine the input that produces a given output.
Introduction
Since hash functions are also deterministic (meaning that the same
input produces the same output), comparing two password hashes (the
stored one and the hash of the password provided by a user) is almost
as good as comparing the real passwords.
Password cracking refers to the process of extracting passwords from
the associated password hash.
This can be accomplished in a few different ways:
• Dictionary attack: Most people use weak and common passwords.
Taking a list of words and adding a few permutations — like
substituting $ for s — enables a password cracker to learn a lot of
passwords very quickly.
Introduction
• Brute-force guessing attack: There are only so many potential
passwords of a given length. While slow, a brute-force attack (trying
all possible password combinations) guarantees that an attacker will
crack the password eventually.
• Hybrid attack: A hybrid attack mixes these two techniques. It starts
by checking to see if a password can be cracked using a dictionary
attack, then moves on to a brute-force attack if it is unsuccessful.
Most password-cracking or password finder tools enable a hacker to
perform any of these types of attacks.
Most prominent password cracking tools
John the Ripper - well-known free open-source password cracking
tool for Linux, Unix and Mac OS X.
Ophcrack - free Windows password cracker based on rainbow
tables.
Hashcat - popular open-source software for cracking passwords
that can crack various hashes using various attack modes
Hydra - an excellent tool to perform brute force attacks, it provides
various other options which can make your attack more intense and
easier to gain unauthorized access to the system remotely.
John the Ripper
John the Ripper is a well-known free open-source password cracking
tool for Linux, Unix and Mac OS X.
A Windows version is also available.
John the Ripper offers password cracking for a variety of different
password types.
It goes beyond OS passwords to include common web apps (like
WordPress), compressed archives, document files (Microsoft Office
files, PDFs and so on), and more.
A pro version of the tool is also available, which offers better features
and native packages for target operating systems.
You can also download Openwall GNU/*/Linux that comes with John
the Ripper.
How to Setup Your Test Environment
That’s why experts often say these kinds of attacks are about time
and calculation power, but if you don’t secure your passwords,
they will be found at the speed of light.
How Do You Crack Passwords with John the Ripper?
What is ophcrack?
Ophcrack is a free Windows password cracker based on
rainbow tables.
It is a very efficient implementation of rainbow tables done by
the inventors of the method.
It comes with a Graphical User Interface and runs on multiple
platforms.
Features:
• � Runs on Windows, Linux/Unix, Mac OS X, ...
• � Cracks LM and NTLM hashes.
OPHCRACK
You can also view the list of hashes from the command line using
--help.
How to Use Hashcat
And scroll down a little until you see the section titled “Hash
modes.”
On a Linux system, you can also use the grep command to search
quickly for a specific hash, such as hashcat --help | grep md5.
Hydra
Hydra is one of the favorite tools of security researchers and
consultants.
Being an excellent tool to perform brute force attacks, it provides
various other options which can make your attack more intense and
easier to gain unauthorized access to the system remotely.
Hydra – a very fast network logon cracker which supports many
different services.
It is a parallelized login cracker which supports numerous
protocols to attack.
New modules are easy to add, besides that, it is flexible and very
fast.
Hydra
This tool gives researchers and security consultants the possibility
to show how easy it would be to gain unauthorized access from a
remote to a system.
Currently this tool supports:
adam6500, afp, asterisk, cisco, cisco-enable, cvs, firebird, ftp, ftps,
http[s]-{head|get|post}, http[s]-{get|post}-form, http-proxy, http-
proxy-urlenum, icq, imap[s], irc, ldap2[s], ldap3[-{cram|digest}md5]
[s], mssql mysql(v4), mysql5, ncp, nntp, oracle, oracle-listener,
oracle-sid, pcanywhere, pcnfs, pop3[s], postgres, rdp, radmin2, redis,
rexec, rlogin, rpcap, rsh, rtsp, s7-300, sapr3, sip, smb, smtp[s], smtp-
enum, snmp, socks5, ssh, sshkey, svn, teamspeak, telnet[s], vmauthd,
vnc, xmpp
Hydra
If you have a correct username but want to login without knowing the
password, so you can use a list of passwords and brute force on
passwords on the host for ftp service.
hydra -l ignite -P pass.txt 192.168.1.141 ftp
Here -l option is for username -P for password lists and host ip
address for ftp service.
For login ignite password 123 made success.
To guess username for specific password
You may have a valid password but no idea what username to
use.
Assume you have a password for specific ftp login.
You can brute force the field with correct username wordlists to
find the correct.
You can use the -L option to specify user wordlists and the -p
option to specify a specific password.
hydra -L users.txt -p 123 192.168.1.141 ftp
Here, our wordlist is users.txt for which -L option is used, and
password is 123 and for that -p option is used over ftp.
Brute forcing Username and Password
Now if you don’t have either of username or password, for that you
can use a brute force attack on both the parameters username and
password with a wordlist of both and you can use -P and -U
parameters for that.
hydra -L users.txt -P pass.txt 192.168.1.141 ftp
Users.txt is wordlist for username and pass.txt is wordlist for
password and the attack has displayed valid credentials ignite and
123 for the host.
Verbose and Debug Mode
-V option is used for verbose mode, where it will show the login+pass
combination for each attempt.
Here, we have two wordlists users.txt and pass.txt so the brute force
attack was making combinations of each login+password and verbose
mode showed all the attempts.
hydra -L users.txt -P pass.txt 192.168.1.141 ftp -V
Here the users.txt has 5 usernames and pass.txt has 7 passwords so the
number of attempts was 5*7= 35 as shown in the screenshot.
Now is the -d option used to enable debug mode. It shows the complete
detail of the attack with wait time, conwait, socket, PID, RECV
hydra -l ignite -P pass.txt 192.168.1.141 ftp -d