Did you find what files work? Please dm me if you can
Did you find the file that works?
1: Nmap Scan 22, 21
are open
2: Brute force attack using Hydra or Crackmapexec //Note 21 âFTPâ is faster than SSH
3: Download password.list and username.list wget https://academy.hackthebox.com/storage/resources/Password-Attacks.zip
4: In Brute force attack use the password.list and username.list //You can downloads them from resources ex: hydra -L username.list -P password.list ftp://IP
//Just be patient
5: Connect through FTP and download id_rsa // ftp IP
, then enter the password
6: Connect through SSH ssh USER@IP -i id_rsa
, then enter the password
7: Find the ROOT password, hint: check the history
try to lower number of tasks by removing -t64 or setting lower number
just use the files provided in module resources
Lab Easy itâs OK!
However I couldnât find the correct credentials using username.list and password.list. Iâve used hydra and crackmap whith out results.
I can resolve the module only reading this forum where they mention user M***.
Maybe should update this Lab
kira has a husband that she met in the library i think while they were studying about licensing products he must have felt so lucky, like he was in the casino or something
Text me for any questions
Same
https : // medium . com /@simonghostriley/password-attacks-9fc738244a60?sk=aa9cb3ce16a596fe1eb2b5abfb239242
check the write up if you still having problems
https : // medium . com / @simonghostriley/password-attacks-9fc738244a60
This lab is a complete waste of time. Rather than actually learning something, you just bang your head on a brick wall trying to get Hydra to enumerate through the word lists.
The only way I moved forward was reading the forum, literally hours wasted
I have problems because crackmapexec is deprecated, and is replaced by netexec, which giges me a huge error when trying to brute force ssh passwordâŚand Iâm stuck with hydra.