Login brute forcing Web Services

Hi.In this module I try to use medusa command firslty for ssh services. But It gives “No supported authentication methods located.” error. When I try to login service with ssh sshuser@ip -p 22 it didnt require password, but it required publickey. And i think medusa is not capable for this. Any tips?

UPD: I solved it port number was wrong

#tips:

  • read about medusa (ex.: man medusa; medusa -h)
  • lmgtfy (check your error-message, in this case: “No supported authentication methods located.”)
  • " it didnt require password, but it required publickey" - lmgtfy: difference ssh login ssh publickey tutorial

hope that helps.

you’re in a good way!
keep it up and good luck!

P.S.

  • medusa for web services? :wink:
  • web services via ssh? :wink:
  • lmgtfy… :wink:

Thanks for response. But I tried after you said and I also generated id_rsa key but again it doesnt work. "medusa -h 83.136.251.170 -n 22 -u sshuser -P SecLists/Passwords/2020-200_most_used_passwords.txt -M ssh -t 5 " i use this command as the module said. But publickey is problem. How can brute-force the ssh session without publickey also without password

Dude, Have you solved this question?
I use hydra & medusa , can’t find the SSH’s password?
the username seems in top-usernames-shortlist.txt

As I remember username is sshuser. And password is in 2023-200_most_used_passwords.txt. But dont forget change the port that given to you. Dont write port 22. If you have any questions you can ask

1 Like

I found ssh password but once you login and find the port the message below appears. The attached has my port given by htb just as an example but even when I use the one I found using nmap that says the port is open, it tells me its closed once I run the command. I have reset the target multiple times also. Any help is appreciated!!

I am using this command in the target system
medusa -h 94.237.59.237 -u ftpuser -P 2020-200_most_used_passwords.txt -M ftp -t 3

medusa -h ip -n port -u sshuser -P 2023-200_most_used_passwords.txt -M ssh -t 3

This is how i found it, just use the target you are given in the module!