Login Brute Forcing
What is Brute Forcing?
A trial-and-error method used to crack passwords, login credentials, or encryption keys by systematically trying every possible combination of characters.
Factors Influencing Brute Force Attacks
Complexity of the password or key
Computational power available to the attacker
Security measures in place
How Brute Forcing Works
Start: The attacker initiates the brute force process.
Generate Possible Combination: The software generates a potential password or key combination.
Apply Combination: The generated combination is attempted against the target system.
Check if Successful: The system evaluates the attempted combination.
Access Granted (if successful): The attacker gains unauthorized access.
End (if unsuccessful): The process repeats until the correct combination is found or the attacker gives up.
Types of Brute Forcing
Simple Brute Force
Tries every possible character combination in a set.
No prior information about the password.
Dictionary Attack
Uses a pre-compiled list of common passwords.
The password is likely weak or common.
Hybrid Attack
Combines brute force and dictionary attacks.
Target uses modified common passwords.
Credential Stuffing
Uses leaked credentials from other breaches.
Target may reuse passwords.
Password Spraying
Attempts common passwords across many accounts.
Account lockout policies are in place.
Rainbow Table Attack
Uses precomputed tables of password hashes.
Cracking a large number of password hashes.
Reverse Brute Force
Targets a known password against multiple usernames.
Password reuse is suspected.
Distributed Brute Force
Distributes attempts across multiple machines.
Password is complex, and one machine isn't enough.
Default Credentials
Linksys Router
admin
admin
Netgear Router
admin
password
TP-Link Router
admin
admin
Cisco Router
cisco
cisco
Ubiquiti UniFi AP
ubnt
ubnt
Brute-Forcing Tools
Hydra
Fast network login cracker.
Supports numerous protocols.
Uses parallel connections for speed.
Flexible and adaptable.
Examples:
Medusa
Fast, massively parallel, modular login brute-forcer.
Supports a wide array of services.
Examples:
Custom Wordlists
Username Anarchy
CUPP (Common User Passwords Profiler)
Password Policy Filtering
Minimum Length (8 characters)
grep -E '^.{8,}$' wordlist.txt
At least 8 characters long.
At Least One Uppercase Letter
grep -E '[A-Z]' wordlist.txt
Contains uppercase letters.
At Least One Lowercase Letter
grep -E '[a-z]' wordlist.txt
Contains lowercase letters.
At Least One Digit
grep -E '[0-9]' wordlist.txt
Contains digits.
At Least One Special Character
grep -E '[!@#$%^&*()_+-=[]{};':",.<>/?]' wordlist.txt
Contains special characters.
No Consecutive Repeated Characters
grep -E '(.)\1' wordlist.txt
Avoids repeated characters.
Exclude Common Patterns
grep -v -i 'password' wordlist.txt
Excludes common patterns.
Exclude Dictionary Words
grep -v -f dictionary.txt wordlist.txt
Excludes dictionary words.
Combination of Requirements
grep -E '^.{8,}$' wordlist.txt
grep -E '[A-Z]'
Last updated