Pentesting 101: Brute Force Attack
- by Vince
-
in Blog
-
Hits: 4769
I assume when I say "Brute Force Attack" that we all know what I'm talking about. Just in case -- let's pretend we have a lock, a pocket full of keys, and we try each key in the lock until we exhaust the collection of keys or we are able to open the lock. Now let's say the lock is a login, the pocket full of keys, the wordlist, and the act of trying the keys is some sort of application to perform the task.
I'm not sure that helps or hurts so I'll move on to what we're attempting to do in our first example.
I've setup a user on an Ubutnu server and that server has SSH access enabled. Our victim user is: bforce and the password is: 123456
The first tool we're going to use is Hydra.