Mastering Password Cracking With Hydra (The Right Way)

แชร์
ฝัง
  • เผยแพร่เมื่อ 19 พ.ค. 2024
  • Join this channel to get access to perks:
    / @pentest_tv
    Join us as we dive into the world of brute force password attacks in professional penetration testing using the Hydra tool! Learn about the two different stages of password attacks and follow along with our demonstrations. Subscribe for more hacking tutorials and cybersecurity tips!
    Join us at Pentest.TV
    Join our Discord at / discord

ความคิดเห็น • 27

  • @tmac9208
    @tmac9208 2 หลายเดือนก่อน +3

    DVWA = Dam Vulnerable Web Application - free to use

    • @pentest_TV
      @pentest_TV  2 หลายเดือนก่อน

      Yep! There are multiple versions out there so I usually recommend getting the docker version since it’s kept up-to-date with *all* the challenges. Thanks for the comment and for watching!

  • @Adubs4379
    @Adubs4379 2 หลายเดือนก่อน +3

    Can you do a follow up going deeper into more realistic scenarios given the widespread use of better security practices that make these basic brute force attacks ineffective?

    • @pentest_TV
      @pentest_TV  2 หลายเดือนก่อน +1

      Excellent request, and the short answer is "yes" I can do a follow up.... BUT...
      The long answer is that this takes us into the realm of Red Team, which uses a different type of scope, so probably "no." For what was presented in this video, this is very representative of a professional penetration test. When we encounter any implemented security, such as rate limiting or firewalls, within a professional pentest we ask the client to whitelist our attack platform so we don't have to fight those security measures for the sake of time (we pentesters are very expensive and the faster we can go through a network, the better for everyone).
      There is one security measure we don't mess with (and neither do Red Teams), and that is lockout rules. If there are lockout restrictions (like 3 times and you have to get an admin to reset it kind-of-thing), the best practice is to not perform a remote password brute force attack against the system because it will cripple the organization, which isn't ever an objective within an pentest scope. Best thing to do when encountering a lockout is to simply attack a different protocol, like SSH or FTP or whatever else you find. lockouts are usually restricted to protocols like HTTPS or RDP. Again, when we hit lockouts, we take the Loss and move onto the next protocol or attack vector.
      For Red Teams, as I mentioned, there are ways to circumvent security implementations; time being the largest component, which makes RT engagements more expensive. Since RT engagements are intended to be performed in a way to avoid detection, they have to go slow anyway, and may skip the brute force attack performed during the exploitation phase altogether since the traffic it generates is easy to identify within a SOC / NOC.
      I will produce some evasion techniques since I discussed them in my latest book (to be released in January 2025... more info to follow), to include things like fragrouter, so keep an eye out for them. Thanks for the comment... sorry for the long explanation, and if you have any additional questions, please don't hesitate to ask!

  • @yoooukoso
    @yoooukoso 2 หลายเดือนก่อน

    Nice video! I love how little filler there is: just straight to the point, clear explanation

    • @pentest_TV
      @pentest_TV  2 หลายเดือนก่อน

      Thanks for the compliment! Glad you enjoyed it and there’s more tutorials coming. 👍

  • @FreeeWIFI
    @FreeeWIFI 2 หลายเดือนก่อน +2

    Nice video

    • @pentest_TV
      @pentest_TV  2 หลายเดือนก่อน

      Thanks for watching!

  • @MoneyOn_Air
    @MoneyOn_Air 2 หลายเดือนก่อน +1

    but where to learn A to Z coz i don't understand this

    • @pentest_TV
      @pentest_TV  2 หลายเดือนก่อน +1

      Check out my Author Page link - I’ve written multiple books on the subject of professional penetration testing which takes learners from the beginning. Good luck! 👍

  • @TheD4VR0S
    @TheD4VR0S 2 หลายเดือนก่อน +1

    How do you brute force a system that only allows 3 attempts ?

    • @pentest_TV
      @pentest_TV  2 หลายเดือนก่อน +1

      It’s usually not possible within the time confines of a professional penetration test. Red team, probably not either. Microsoft recommends locking an account after 10 attempts, and for no longer than 15 minutes (to prevent denial of service), but an organization can modify those parameters. It’s recommended during a pentest that if you encounter lockouts you do not perform a password brute force attack. It’s simply not worth it.

    • @pentest_TV
      @pentest_TV  2 หลายเดือนก่อน

      Oh, also you can simply shift to a different protocol, like ftp, that typically never does lockouts.

    • @TheD4VR0S
      @TheD4VR0S 2 หลายเดือนก่อน +1

      @@pentest_TV thanks

  • @Softtt460
    @Softtt460 2 หลายเดือนก่อน +1

    Do you have termux tutorial on this?

    • @pentest_TV
      @pentest_TV  2 หลายเดือนก่อน

      I don’t. The tutorials I provide here are within the framework of a professional penetration test and performing these tasks on anything other than a standard pc or pc image would negatively impact performance and speed. That said, I did do a talk at DefCon 17 on performing pentests using an iPod Touch… so definitely R&D that. 😎

    • @Softtt460
      @Softtt460 2 หลายเดือนก่อน +1

      @@pentest_TV oh i will check that

  • @mutabazilionel
    @mutabazilionel 2 หลายเดือนก่อน

    Please make me your student.

    • @pentest_TV
      @pentest_TV  2 หลายเดือนก่อน

      Make sure to check out pentest.tv for free and paid training! Also, join our discord server. Thanks for watching!

  • @smouhamadoulfadal1710
    @smouhamadoulfadal1710 หลายเดือนก่อน +1

    Hello,
    can you make a video on the xss fail with beef

    • @pentest_TV
      @pentest_TV  หลายเดือนก่อน +1

      I have xss on my list of tutorials to do, and I can definitely discuss BeEF. Thanks for the question!

    • @smouhamadoulfadal1710
      @smouhamadoulfadal1710 หลายเดือนก่อน +1

      @@pentest_TV where exactly ?

    • @pentest_TV
      @pentest_TV  หลายเดือนก่อน +1

      It’s not done yet but it is on my to-do list.

    • @smouhamadoulfadal1710
      @smouhamadoulfadal1710 หลายเดือนก่อน +1

      @@pentest_TValright We are impatiently waiting for it 👍

    • @pentest_TV
      @pentest_TV  หลายเดือนก่อน +1

      😁