✔️ Assess password policies via network services

✔️ Gain access to network services

✔️ Gain access to web applications

we can use similar approach as password-file cracking on network authentications such as:

we can use both attacks against a network authentication

  1. Brute force
  2. Dictionary-based attack

Brute force 🔨 vs 📖 Dictionary attacks

why is brute force impractical?

Online vs Offline Brute Force attacks:

time to test password offline (JtR) → processing time

over a network, time to test passwords depends on:

That's why network authentication attacks practically depend on → dictionary attacks

use common default usernames and passwords

collection of passwords


🧰 Tools for Network Authentication attacks

🐉 Hydra

Fast, parallelized, network authentication cracker that supports different protocols

can attack ~50 different service types

✅dictionary attacks

✅bruteforce attacks

Hydra architecture is based on modules

A module is a piece of code that let's Hydra attack a specific protocol


https://s3-us-west-2.amazonaws.com/secure.notion-static.com/244b4a93-fd77-46b0-b3fb-adeeb914fd60/Untitled.png

🧭 Configuring Hydra