Sunday, May 29, 2022
HomeHackerA Detailed Information on Medusa

A Detailed Information on Medusa


Hello Pentesters! Let’s study a special software Medusa, which is meant to be a speedy, parallel and modular, login brute forcer. The purpose of the software is to help as many companies which permit distant authentication as doable. We are able to contemplate the next gadgets to be a few of the key options of the appliance.

  1. Thread-based parallel testing. Brute-force testing could be carried out towards a number of hosts, customers or passwords concurrently.
  2. Versatile consumer enter. Goal data (host/consumer/password) could be laid out in a wide range of methods. For instance, every merchandise could be both a single entry or a file containing a number of entries. Moreover, a mix file format permits the consumer to refine their goal itemizing.
  3. Modular design. Every service module exists as an unbiased .mod file. Which means no modifications are essential to the core software as a way to prolong the supported checklist of companies for brute-forcing.

in This text will talk about the next choices out there with Medusa.

Desk of Contents

  1. Options of Medusa
  2. Password Cracking for particular Username
  3. Username Cracking for particular Password
  4. To crack login credentials
  5. Brute Pressure on A number of Host
  6. To assault a particular port reasonably than the default
  7. Extra password checks (Null/Identical)
  8. To Save Logs in a File
  9. Cease on Success.
  10. To suppress start-up Banner
  11. Verbose Mode
  12. Error Debug stage
  13. Utilizing Combo Entries
  14. Concurrent testing on a number of logins
  15. Show Module Utilization Info

Options of Medusa

To get to know an in depth description of the choices out there within the Medusa software simply sort in “medusa” within the kali terminal with none choices, it can respectively dump all of the out there choices with their description.

Syntax: Medusa [-h host|-H file] [-u username|-U file] [-p password|-P file] [-C file] – 0063M module [OPT]

You should use -d choice to dump all of the out there modules.

Password Cracking for Particular Username

Being a brute forcer, we are able to use medusa to crack passwords if the username is thought on any protocol. For this to work you need to have a sound username and a file containing passwords to check.

So, for this following command can be utilized:

medusa -h 192.168.1.141 -u ignite -P go.txt -M ftp

Right here, -h possibility is for mentioning goal ip handle, -u possibility for username and -P for file containing password lists. So this may crack the password for FTP protocol.

So, from the checklist of passwords, password 123 confirmed success for username ignite and for ftp login.

Username Cracking for Particular Password

Once more, for this you need to have an accurate password with the intention to use brute drive to crack the username for ftp by utilizing a file containing checklist of usernames.

medusa -h 192.168.1.141 -U customers.txt -p 123 -M ftp

Right here -h possibility is used for host, -U possibility for username file and -p is for the password. So mainly, you may carry out brute drive on the username discipline and might crack the proper username for the password.

To crack Login credentials

 Now let’s contemplate a scenario the place we wish to goal our host whose username and password each will not be recognized. For this we’ll brute drive each the fields username in addition to password by utilizing applicable choices current in medusa.

medusa -h 192.168.1.141 -U customers.txt -P go.txt -M ftp

Right here we now have used -U possibility for username file, -P possibility for password file and -h for host identify. We have now connected a screenshot on your higher understanding.

Brute Pressure on A number of Host

Now let’s contemplate a special scenario, the place we now have a number of hosts, and we have to crack login credentials for the respective hosts. So, we now have created three textual content information for host, username and password.

medusa -H hosts.txt -U consumer.txt -P go.txt -M ftp

Right here, -H possibility will point out file for host identify, -U will point out file for username and -P will point out file for passwords.

If in case you may have a number of hosts and also you wish to assault on a few of the ports concurrently, for that you should utilize -T possibility which is able to brute drive on some ports solely.

medusa -H hosts.txt -U customers.txt -P go.txt -M ftp -T 1
medusa -H hosts.txt -U customers.txt -P go.txt -M ftp -T 2

The primary command will brute drive on first host solely, however the second will assault on 2 hosts concurrently.

To assault a particular port than default

Typically, the community admin might change the port variety of service to a different port as a result of safety causes. So, when performing a brute drive assault utilizing regular command so it can assault on default port. However we are able to use -n possibility in order that assault will begin on a talked about port reasonably than the default port.

medusa -h 192.168.1.141 -U customers.txt -P go.txt -M ssh
medusa -h 192.168.1.141 -U customers.txt -P go.txt -M ssh -n 2222

Right here, within the first command, we’re utilizing -h, -U and -M possibility and ssh service whose default port is 22. However as a result of safety causes, its port quantity is modified to 2222 as detected utilizing the nmap scan and first command didn’t work. So, to launch the assault we used -n possibility which is able to specify the particular port quantity.

Extra password checks (Null/Identical)

Medusa has an incredible possibility -e together with ns which is able to test [n] null password, [s] the identical password as username whereas brute forcing on the password discipline.

medusa -h 192.168.1.141 -u ignite -P go.txt -M ftp -e ns

Right here, as you may observe, -e possibility is used within the command so with each username It’s making an attempt to match the next mixture of password with a username.

Consumer: Ignite     Password: “ “ as null password.

Consumer: Ignite     Password: “Ignite” similar as username

To Save Logs in a File

For higher readability, document upkeep and future references we are able to save the output of the brute drive assault of the medusa software in a special textual content file. For this, we’ll use parameter -O to avoid wasting output in textual content file.

medusa -h 192.168.1.141 -u ignite -P go.txt -M ftp -O log.txt

Right here, once more the command is similar we now have simply added a brand new parameter -O to retailer the logs in textual content file log.txt. Then to make sure whether or not the output is saved in file, we now have opened it utilizing cat command. And the end result exhibits the specified output.

Cease on Success

Whereas utilizing the above command, the assault will go on although we get the proper username and password, this may increasingly turn into tedious when the checklist of usernames and password is lengthy.

So, to avoid wasting from this medusa supplies some choices.

 medusa -H hosts.txt -U customers.txt -P go.txt -M ftp -f
 medusa -H hosts.txt -U customers.txt -P go.txt -M ftp -F

Above within the first command as you may observe -f possibility is used so that may cease scanning host after first legitimate username/password discovered.

And within the second command, -F possibility is used that may cease audit after first legitimate username/password discovered on any host.

 To suppress start-up Banner

Everytime you run medusa, at all times a begin up banner is displayed. However this software supplies an choice to take away the banner by utilizing -b possibility.

medusa -h 192.168.1.141 -U customers.txt -P go.txt -M ftp -b

As within the screenshot shows, after making use of -b possibility, the banner is suppressed.

Verbose Mode

This software supplies an possibility for verbose mode. There are in all six verbose stage. All messages at or under the desired stage will probably be displayed. The default stage is 5. The next is the breakdown of the verbose ranges:

0.EXIT APPLICATION

1.MESSAGE WITHOUT TAG

2.LOG MESSAGE WITHOUT TAG               

3.IMPORTANT MESSAGE

4.ACCOUNT FOUND

5.ACCOUNT CHECK

6.GENERAL MESSAGE

medusa -H hosts.txt -U customers.txt -P go.txt -M ftp -v
medusa -H hosts.txt -U customers.txt -P go.txt -M ftp -v 6

Right here, within the given instructions, verbose stage 5 and stage 6 is used. Degree 5 performs account test and stage 6 shows common message additionally.

Error Debug stage

This feature is used to offer detailed description of error. There are 10 error debug stage. All messages at or under the desired stage will probably be displayed. The default stage is 5.

The next is the breakdown of the error ranges:

0: FATAL

1: ALERT

2: CRITICAL                                       

3: ERROR                             

4: WARNING                                     

5: NOTICE

6: INFO                                                

7: DEBUG                                            

8: DEBUG-AUDIT                             

9: DEBUG- SERVER

10: DEBUG – MODULE

medusa -h 192.168.1.141 -U customers.txt -P go.txt -M ftp -w 0
medusa -h 192.168.1.141 -U customers.txt -P go.txt -M ftp -w 06
medusa -h 192.168.1.141 -U customers.txt -P go.txt -M ftp -w 07

Utilizing Combo Entries

Medusa offers an possibility of utilizing combo entries whereas brute forcing. The choice -C makes use of a file containing combo entries. Combo information are colon separated and within the following format: host:consumer:password. If any of the three fields are left empty, the respective data ought to be supplied both as single world worth or as an inventory in a file. You should use following combos.

host:consumer:password

host:consumer:

host::

username:password

username:

password

host::username

medusa -M ftp -C userpass.txt

So right here first userpass.txt file is created the place information is saved in type of host:username:password. After which medusa brute drive assault is carried out utilizing -C possibility. You’ll be able to take reference from screenshot connected.

Concurrent testing on a number of logins

If you wish to carry out concurrent testing on a number of logins so for that you simply use -t possibility. After that point out the variety of logins you wish to take a look at concurrently and therefore medusa will brute drive on respective logins.

medusa -h 192.168.1.141 -U customers.txt -P go.txt -M ftp -t 4

So, whereas performing the assault it examined concurrently 4 logins at specified port and printed outcomes for all 4 concurrently.

Show Module Utilization Info

You should use a brand new possibility -q which is able to show module’s utilization data. This ought to be used along side the “-M” possibility.

medusa -h 192.168.1.141 -U customers.txt -P go.txt -M ftp -q

Creator: Divya Adwani is a researcher and technical author who could be very a lot eager to be taught and enthusiastic to be taught moral hacking Contact right here

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments