Skip to main content

One post tagged with "Rule-Based Attack"

This technique is used by attackers who understand specific password policies or rules enforced by a system or organization. By analyzing these rules, they can infer common patterns and weaknesses in passwords, such as minimum length requirements, character combinations, or allowed special characters. Using this knowledge, attackers can tailor their attacks to exploit the weaknesses of the password policy.

View All Tags

THM | Password Attacks

· 27 min read

Red Teaming | Password Attacks | Summary:

This room is designed to teach about various strategies and techniques used in cracking or guessing passwords. It covers both offline and online methods, including dictionary and brute-force attacks, rule-based attacks, and custom rules.

The room emphasizes password profiling, teaching users how to create effective wordlists using default, weak, leaked, combined, and username sources.

Other topics include keyspace techniques, CUPP (Custom Password Profile), and online attacks targeting FTP, SMTP, SSH, and HTTP login pages. Additionally, it introduces the concept of password spraying attacks.