Password Attacks Workflow
Password Attacks Workflow
Table of Contents
Overview
What is Password Attacking?
Attack Surface Considerations
Factor
Impact
Mitigation Challenge
Attack Decision Framework
Target Assessment:
Attack Methodology
Phase 1: Reconnaissance
Phase 2: Credential Discovery
Phase 3: Attack Execution
Phase 4: Post-Exploitation
Attack Types
Simple Brute Force
Charset
Length
Combinations
Time @ 1M/s
Dictionary Attack
Hybrid Attack
Credential Stuffing
Password Spraying
Rainbow Table Attack
Reverse Brute Force
Distributed Brute Force
Default Credentials
Network Infrastructure
Device/Vendor
Username
Password
Notes
Web Applications & Services
Application
Username
Password
Notes
Virtualization & Cloud
Platform
Username
Password
Notes
Out-of-Band Management
Device
Username
Password
Notes
Databases
Database
Username
Password
Port
Default Credential Resources
Brute-Forcing Tools
Hydra
Medusa
Ncrack
CrackMapExec (NetExec)
Patator
Kerbrute
Wordlist Generation
Username Generation
CUPP (Common User Passwords Profiler)
CeWL (Custom Word List Generator)
Mentalist
Crunch
Wordlist Management
Password Mutation
Password Policy Filtering
Hashcat Rules
John the Ripper Rules
Manual Mutation Techniques
Remote Password Attacks
Windows Services
Linux Services
Web Services
Database Services
Other Services
Windows Local Password Attacks
Credential Discovery
Memory Attacks
SAM Database Extraction
NTDS.dit Extraction (Domain Controllers)
Mimikatz Attacks
Tools Summary
Linux Local Password Attacks
Password File Locations
Configuration File Search
History Files
SSH Key Discovery
Database File Search
Credential Files in Web Directories
Memory and Process Analysis
Crack Linux Hashes
Automated Enumeration
Hash Cracking
Hash Identification
Common Hash Types Reference
Hash Type
Example
Hashcat Mode
John Format
Hashcat Usage
John the Ripper Usage
Hash Extraction Tools
Online Cracking Services
Decrypt with OpenSSL
Protocol-Specific Attacks
Kerberos Attacks
NTLM Relay
LLMNR/NBT-NS Poisoning
Defensive Considerations
Detection Indicators
Attack Type
Indicators
Log Sources
Prevention Measures
Control
Effectiveness
Implementation
KQL Detection Queries
Quick Reference
Hydra Cheat Sheet
Hashcat Mode Reference
Common Wordlist Locations
Credential Extraction Quick Reference
Tags
Last updated