Custom Wordlists

Custom Wordlists

  • Pre-made Wordlists: Tools like rockyou and SecLists are broad and may not be efficient for specific targets.

  • Targeted Approach: For example, when attempting to access system files for "Thomas Edison," generic lists are unlikely to yield results due to unique username patterns enforced by organizations.

  • Creating Custom Wordlists: Tailor wordlists based on information from social media, company directories, and leaked data to improve efficiency in brute-force attacks.

Username Anarchy

  • Username Variability: Even simple names can lead to complex username combinations. Consider variations like initials, middle names, hobbies, and leetspeak.

  • Tool Usage: Use the Username Anarchy script to generate potential usernames based on the target's first and last names.

    • Installation:

      • sudo apt install ruby -y
        git clone https://github.com/urbanadventurer/username-anarchy.git
        cd username-anarchy

      • Example command:

        • ./username-anarchy Ron Smith > ron_smith_usernames.txt

  • Output: The generated list includes basic combinations, initials, and creative variations, enhancing the chances of finding the correct username.

CUPP (Common User Passwords Profiler)

  • Password Generation: CUPP creates personalized password lists based on detailed information about the target.

  • Information Gathering: Collect data from social media, company websites, public records, and news articles to inform the password generation process.

  • Example Profile for Ron Smith: Include details like birthdate, partner's name, interests, etc.

  • CUPP Execution: Run CUPP in interactive mode to input the gathered information and generate a comprehensive password list.

    • Example command: cupp -i

  • Output: The generated list includes variations like original, reversed, concatenated, and leetspeak passwords.

Filtering Passwords

  • Password Policy Compliance: Use grep to filter the generated password list to meet specific company policies (e.g., length, character types).

    • Example command:

      grep -E '^.{6,}$' ron.txt | grep -E '[A-Z]' | grep -E '[a-z]' | grep -E '[0-9]' | grep -E '([!@#$%^&*].*){2,}' > ron-filtered.txt

Brute-Force Attack with Hydra

  • Using Hydra: Combine the username and filtered password lists to perform a brute-force attack on the login form.

    • Example command:

      hydra -L ron_smith_usernames.txt -P jane-filtered.txt SERVER_IP -s SERVER_PORT -f http-post-form "/:username=^USER^&password=^PASS^:Invalid credentials"
  • Outcome: Upon successful completion, log in using the discovered credentials to access system files.

Summary

Utilizing custom wordlists, Username Anarchy, and CUPP significantly enhances the efficiency of brute-force attacks by tailoring approaches to specific targets. This method minimizes wasted effort and maximizes the likelihood of success in accessing system files.

Last updated