AdSense

Tuesday, April 3, 2018

Bruteforce (II): attacking an SSH server with BRUTER


BRUTEFORCE (II):  ATTACKING AN SSH SERVER WITH BRUTER

- Layout for this exercise:





- This exercise is based in the previous one:


http://www.whitelist1.com/2018/04/bruteforce-i-attacking-ftp-server-with.html



1 - Setting up an SSH server

- Downloading the freeSSHd server to the victim Windows 10:





- Running the executable:















- Going to the SSH server Settings:




- Starting the SSH server on the victim side Windows 10:




- Adding a user admin and a simple password (123):




- Finally the SSH server is up and running:




- Checking that the SSH service works for the user admin:









2 - Bruteforcing the SSH server

- From the attacker machine Windows 7, checking that the port 22 is open at the victim Windows 10 (192.168.1.6):






- Running Bruter.exe from the attacker against the SSH server (IP 192.168.1.6, port 22):




2.1) Dictionary

- Taking the Dictionary option, and browsing for a wordlist:

 




- Starting the attack:




- The attack is successful because and the password (123) is revealed:





2.2) Brute force

- Choosing Brute force, setting options for the Charset and the length of the password:


 




- Starting the attack:





- Finally the attack is successful because the password (123) is revealed:




- The password has been chosen deliberately simple because the purpose of this exercise was just to demonstrate how to operate with the Bruter tool.


- For more complex passwords Bruter has a wide range of predefined Charsets with a greater number of characters, in addition to the possibility of decreasing the Min_Len parameter and increasing Max_Len.


- Obviously, the disadvantage would lie in the slowness of the attack, in addition to the greater amount of resources needed to implement it.