Remote Password Attacks
Common Network Services Overview
Network services frequently targeted during penetration testing include:
Authentication services (SSH, RDP, WinRM)
File sharing services (FTP, SMB, NFS)
Email services (IMAP/POP3, SMTP)
Database services (MySQL/MSSQL)
Directory services (LDAP)
Attack Methodologies & Tools
Windows Remote Management (WinRM)
Protocol Details:
Uses WS-Management (SOAP-based XML)
Ports: TCP 5985 (HTTP), 5986 (HTTPS)
Requires manual activation on Windows 10+
Netexec (formerly CrackMapExec)
Evil-WinRM
Secure Shell (SSH)
Details:
Default Port: TCP 22
Uses multiple encryption methods:
Symmetric (shared key)
Asymmetric (private/public keys)
Hashing for message authenticity
Remote Desktop Protocol (RDP)
Details:
Default Port: TCP 3389
Provides GUI remote access to Windows systems
Server Message Block (SMB)
Details:
Ports: TCP 139, 445
Used for file and printer sharing
Open-source version: Samba
Password Mutation Techniques
Using Hashcat Rules
Basic rule syntax:
:
→ Do nothingl
→ Convert to lowercaseu
→ Convert to uppercasec
→ Capitalize first lettersXY
→ Replace allX
withY
$!
→ Add!
to end
CeWL for Custom Wordlists
Credential Stuffing Attacks
Default Credentials
Common examples:
Using Hydra for Credential Stuffing
Best Practices & Tools Summary
Key Tools
Netexec: Multi-protocol pentesting
Evil-WinRM: WinRM interaction
Hydra: Multi-protocol password brute-forcing
xFreeRDP: RDP client
Hashcat: Password mutation
CeWL: Custom wordlist generation
OSINT Considerations
Research target organization for:
Naming conventions
Common applications
Default credentials
Password policies
Breached credentials
Attack Workflow
Gather target information and credentials
Generate custom wordlists using CeWL
Create mutations using Hashcat rules
Attempt credential stuffing with default passwords
Use appropriate tool based on service (Hydra, Netexec, etc.)