Medusa Brute Force Password Cracking Tool – Digitalmunition




Videos 1583837780_maxresdefault.jpg

Published on April 22nd, 2019 📆 | 4998 Views ⚑

5

Medusa Brute Force Password Cracking Tool



Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items to some of the key features of this application:

*Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.

*Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.
*Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.
#medusa -h 192.168.43.122 -u msfadmin -P /home/c0nan/word.txt -M ssh -n 22
-h specifies the host to be attacked
-u username to try against
-P specifies a list of passwords stored in a wordlist
-M specifies the mode to attack eg ssh, tcp, http etc
-n specifies the port to attack on the specified host
for further instructions, typing in medusa in the terminal will provide a list

source

Tagged with:



5 Responses to Medusa Brute Force Password Cracking Tool

  1. The One says:

    How come http won't work for medusa I try medusa -h login.live.com -u [email protected]gmail.com -p the password -M http and it shows successful when it's incorrect what to do?

  2. How to crack netflix accounts using Kali Linux without sending link to victim

  3. Great mind !! I love the video .It's precise and clear….

  4. Good stuff. I hope being the first to watch, like and comment comes with a reward.

Leave a Reply

Your email address will not be published. Required fields are marked *


loading...