Criminal logo

Content warning

This story may contain sensitive material or discuss topics that some readers may find distressing. Reader discretion is advised. The views and opinions expressed in this story are those of the author and do not necessarily reflect the official policy or position of Vocal.

Hacking

Password Hacking

By Timothy MwitiPublished 2 days ago 3 min read

when you log into your computer or website or anything that requires a password hopefully that password is stored in a database in some location some way in an encrypted fashion maybe it's a hash maybe it's anything but it's not plain text if a hacker threat actor adversary would gain access to that password as it's raw plain text form that could certainly be an issue but in some cases maybe even just a hash is enough for a hacker to crack the hash and then gain access to the account and access in this video I'm going to Showcase three ways where we can put our hacker hat on act as the adversary and then crack a password hash brute force or guest passwords or maybe even pass the hash in some other attacks let's dive in I'm inside of my Kali Linux virtual machine and this is going to be our attacker HQ this is where most of the operations are going to happen but I do want to let you know hey I've got another Linux server Linux host Linux computer up with Ubuntu alongside a Windows machine that will be able to go ahead and beat up in just a moment but back inside of Kali Linux I'm going to open up the terminal click that icon on the top or hit Ctrl alt t on the keyboard and I'm going to zoom in on this terminal here because first of all I want to show you what my IP address is I'm going to go ahead and say the IP Command and a for the shorthand for Adder like address s for the shorthand for show and then the interface that I want to look at in this case I'm going to look at eth0 and it currently has the IP address of 192.168.1166 now that's us that's our Kali Linux machine that's our attack box that's where we're going to be doing the hacking and Kraken over here on the victim machine the target the Ubuntu box let me fire up another terminal I'll go ahead and run the exact same command just so we can kind of get a lay of the land here then Ubuntu usually the interface is now E ns 33 I'll go ahead and take a look at the IP address that is 192.168.1129 now let's say as the attacker from the Kali Linux offensive perspective we don't know any passwords for this Ubuntu machine that we're trying to break into maybe we knew you a username we were able to profile some accounts or some employees or people that use this machine but we still need to try and figure out their password one way you could do that is just kind of guess like I don't know try every single possible letter in the English alphabet every single number every single printable character on the keyboard like the letter A then the letter A A and then the letter a a b and a a c a a d t kind of keep moving down the list to try and generate every possible potential possibility let's try it out see this Ubuntu machine does have SSH or the secure shell running as a service so we could try to SSH into the user at 192.168.1129 It'll ask me further password but I don't know their password so I could try like the letter a and then that won't work for us let's try the letter A A maybe two A's there is a combination doesn't work either

how to

About the Creator

Timothy Mwiti

Enjoyed the story?
Support the Creator.

Subscribe for free to receive all their stories in your feed. You could also pledge your support or give them a one-off tip, letting them know you appreciate their work.

Subscribe For Free

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments (1)

  • kinyua kithinji2 days ago

    nice one

Timothy MwitiWritten by Timothy Mwiti

Find us on social media

Miscellaneous links

  • Explore
  • Contact
  • Privacy Policy
  • Terms of Use
  • Support

© 2024 Creatd, Inc. All Rights Reserved.