house-laptopRemote Password Attacks

Common Network Services Overview

Network services frequently targeted during penetration testing include:

  • Authentication services (SSH, RDP, WinRM)

  • File sharing services (FTP, SMB, NFS)

  • Email services (IMAP/POP3, SMTP)

  • Database services (MySQL/MSSQL)

  • Directory services (LDAP)

Attack Methodologies & Tools

Windows Remote Management (WinRM)

  • Protocol Details:

    • Uses WS-Management (SOAP-based XML)

    • Ports: TCP 5985 (HTTP), 5986 (HTTPS)

    • Requires manual activation on Windows 10+

Netexec (formerly CrackMapExec)

Evil-WinRM

Secure Shell (SSH)

  • Details:

    • Default Port: TCP 22

    • Uses multiple encryption methods:

      • Symmetric (shared key)

      • Asymmetric (private/public keys)

      • Hashing for message authenticity

Remote Desktop Protocol (RDP)

  • Details:

    • Default Port: TCP 3389

    • Provides GUI remote access to Windows systems

Server Message Block (SMB)

  • Details:

    • Ports: TCP 139, 445

    • Used for file and printer sharing

    • Open-source version: Samba

Password Mutation Techniques

Using Hashcat Rules

  • Basic rule syntax:

    • : → Do nothing

    • l → Convert to lowercase

    • u → Convert to uppercase

    • c → Capitalize first letter

    • sXY → Replace all X with Y

    • $! → Add ! to end

CeWL for Custom Wordlists

Credential Stuffing Attacks

Default Credentials

  • Common examples:

Using Hydra for Credential Stuffing

Best Practices & Tools Summary

Key Tools

  • Netexec: Multi-protocol pentesting

  • Evil-WinRM: WinRM interaction

  • Hydra: Multi-protocol password brute-forcing

  • xFreeRDP: RDP client

  • Hashcat: Password mutation

  • CeWL: Custom wordlist generation

OSINT Considerations

  • Research target organization for:

    • Naming conventions

    • Common applications

    • Default credentials

    • Password policies

    • Breached credentials

Attack Workflow

  1. Gather target information and credentials

  2. Generate custom wordlists using CeWL

  3. Create mutations using Hashcat rules

  4. Attempt credential stuffing with default passwords

  5. Use appropriate tool based on service (Hydra, Netexec, etc.)