Hot on the heels of my last post this module is like wading through treacle! Surely no-one else is as dumb as I am at these things!
So can I get this mutated password list to work agains the target??? No I cannot!!
As far as I can tell I have mutated the password list as per the instructions using the provided resources (custom.rule etc) but when I come to run hydra using the command below I am not getting any password hits.
Iāve tried this using my Parrot VM, Kali VM and the built in pwnbox to no availā¦ please someone end this misery!
it says:
brute force the password for the user āsamā.
and you are using the whole list thatās why itās taking foreverā¦
brute force from pwnbox ftp://
not ssh://
it will be faster and use many tasks with a flag -t 50
you can also split a big file into 10k lines and try one by one, if you get lucky youāll get a fast hit.
split -l 10000 mut_password.list mut_passwd_
It finally worked!! Thank you @hackernotone!! Iām definitely starting to realise that HTB can be a bit glitchy and inconsistent at times and that things may work within the built in pwnbox that wonāt work in a local VM.
Iād seen a post from someone else with this same issue who had been attempting FTP and was advised to use SSH but for me FTP has worked this time so go figure! I can finally move on with my life!
1 Like