Friday 17 April 2015

1 Hack password using BRUTUS (dictionary attack method)

Hack password using BRUTUS 
(dictionary attack method) 
 INTRODUCTION:-

   A dictionary attack is when a text file full of commonly used passwords, or a 

list of every word from the dictionary is used against a password database. Strong 
passwords usually aren't vulnerable to this kind of attack. In the following 
example, I will use Brutus, a very common password cracker, to show a dictionary 
attack against an ftp server. Brutus is a Windows only program, but at the end of 
this chapter I will list a couple more password crackers, some of which are made 
for Mac, Windows, and Linux. 

TUTORIALS:-

1. First the hacker would choose a target. In this case it’s my home 
computer and the IP address for your home computer is 127.0.0.1 . 


2. By going to ftp://127.0.0.1 I get a pop-up box asking for a username and 
password. 


3. Next the hacker would launch  Brutus and attempt 
to crack the password. 


4. In the target you put the IP address of the website and to the right 
select the appropriate option, which in this case is FTP. 

5. The default port is 21 but some websites change this to make them a 
little more secure. If you find out that the port isn’t 21, you can find the 
right one by doing a port scan. We will get into this later in the book. 

6. If you don’t know any of the usernames for the FTP server, then you will 
have to get a list of the most common usernames. 

7. For a dictionary attack you will have to choose the pass mode Word List 
and browse and select the file containing your word list. You can get 
some good password lists at 
http://packetstormsecurity.com/Crackers/wordlists/

 Below are 
examples of what a username and password list might look like. 








8. Once you hit Start the program will attempt to connect to the server and 
begin to try all the possible combinations from your lists. 





9. If you’re lucky, eventually it’ll get the right Username:Password 
combination. As you can see below, it got the correct combination of 
username – admin and password – password. 


10. A smarter hacker would use a proxy when using a program like this. 
What a proxy does is cloaks your IP address by sending your connection 
request through another computer before going to the target. This is a 
smart idea because as you will see in the image below, Brutus leaves a 
huge log of your presence on the target server.



In place of the IP address 127.0.0.1 would be the hackers IP address. 
Footprints like these get a hacker caught and into a lot of trouble with 
the law. 



1 comments:

Unknown said...

for this attack which software we have to use

Post a Comment