Results 1 to 11 of 11

Thread: Brute Force Router Password??

  1. #1
    Join Date
    2014-Oct
    Posts
    11

    Brute Force Router Password??

    What Im looking to do is to get the user name and password for my router. Not the wireless password, which seems to be the only reason people even have kali anymore. Im talking about the login username and password for the router admin page. I have two different routers that I setup to test with. One is a basic linksys router. The other is a buffalo router. Both of which I have set to have the user name and pasword changed from default. I have tried to use brute force from in armitage but the user name and password were not on the list it pulls from. Which I have other questions as to were it pulls its list from but I can make another post abour that later.

  2. #2
    Join Date
    2013-Mar
    Location
    http://rastamouse.me
    Posts
    86
    Hydra and Medusa are probably the de facto for bruteforcing credentials. In this case, you will want to bruteforce the HTTP(S) POST requests.
    OSCP
    --
    If it smells like a duck, walks like a duck and quacks like a duck; then it probably is a duck.

  3. #3
    Quote Originally Posted by rastamouse View Post
    Hydra and Medusa are probably the de facto for bruteforcing credentials. In this case, you will want to bruteforce the HTTP(S) POST requests.
    I tried Medusa on my router, after it said successful and it display the password but it is not the password for my router. I questioned Medusa.
    Where is the darn "any key" key?

  4. #4
    Join Date
    2013-Jun
    Posts
    125
    Quote Originally Posted by thepoor View Post
    I tried Medusa on my router, after it said successful and it display the password but it is not the password for my router. I questioned Medusa.
    Very interesting....

  5. #5
    Join Date
    2014-Oct
    Posts
    11
    Thanks for the feedback guys. Looks like I have my project for the week right there.

  6. #6
    Quote Originally Posted by rastamouse View Post
    Hydra and Medusa are probably the de facto for bruteforcing credentials. In this case, you will want to bruteforce the HTTP(S) POST requests.
    Patator is a nice included multi-service bruteforce tool in Kali, and is often overlooked. Maybe it needs a nicer name?

    Available modules:
    + ftp_login : Brute-force FTP
    + ssh_login : Brute-force SSH
    + telnet_login : Brute-force Telnet
    + smtp_login : Brute-force SMTP
    + smtp_vrfy : Enumerate valid users using SMTP VRFY
    + smtp_rcpt : Enumerate valid users using SMTP RCPT TO
    + finger_lookup : Enumerate valid users using Finger
    + http_fuzz : Brute-force HTTP
    + pop_login : Brute-force POP3
    + pop_passd : Brute-force poppassd (http://netwinsite.com/poppassd/)
    + imap_login : Brute-force IMAP4
    + ldap_login : Brute-force LDAP
    + smb_login : Brute-force SMB
    + smb_lookupsid : Brute-force SMB SID-lookup
    + vmauthd_login : Brute-force VMware Authentication Daemon
    + mssql_login : Brute-force MSSQL
    + oracle_login : Brute-force Oracle
    + mysql_login : Brute-force MySQL
    + mysql_query : Brute-force MySQL queries
    + pgsql_login : Brute-force PostgreSQL
    + vnc_login : Brute-force VNC
    + dns_forward : Forward lookup names
    + dns_reverse : Reverse lookup subnets
    + snmp_login : Brute-force SNMP v1/2/3
    + unzip_pass : Brute-force the password of encrypted ZIP files
    + keystore_pass : Brute-force the password of Java keystore files
    + tcp_fuzz : Fuzz TCP services
    + dummy_test : Testing module

    http://routerpwn.com/ should be at least mentioned in this sort of thread.
    Last edited by clone; 2014-11-17 at 21:14.

  7. #7
    Join Date
    2013-Jul
    Posts
    844
    Why do you not just try pushing the reset button which should restore factory settings to include username and password

    If you need to brute force the password AND you are getting too many false positives, which occurs many times with hydra, turn to burpsuite. Go on the net and find the pro version. The verson in kali is throttled back and too slow. You will need some help files - there are a series of instruction vidios available thru torrents try piratebay or kickass torrents

  8. #8
    Join Date
    2014-Oct
    Posts
    11
    I will look into Patator thank you and your right i have not really heard anything about it. So thats two weeks now worth of play time with my router. I am aware that I can press the reset button and then have the user name and password back to default. Im not doing any of this as a way to get around anything I have all my user names and passwords documented and save and can log in at any time. Im trying to learn Penetesting so I understand it better.

  9. #9
    Join Date
    2015-Sep
    Posts
    1
    I had the same problem, so I decided to spend some time playing with python and came up with a tool that is currently working for two tested routers. The Linksys E1200 and ZyXel FR1000Z. I have my project posted on Git Hub https://github.com/mlockette/RouterBruteForce if you want to use it and possibly expand on it! Like Rastamouse said above these routers use a HTTP POST request for login. Hope this helps you or someone else.

  10. #10
    Join Date
    2015-Aug
    Location
    The Pits
    Posts
    87
    Hello Clone,
    Would you be so kind as to share an example of using Patator against my Ubee access point? My login page is at 192.168.0.1 and the default user name is "user", not "admin".

  11. #11
    This is starting to be a non kali thread.
    Locking.
    This is a Kali-Linux support forum - not general IT/infosec help.

    Useful Commands: OS, Networking, Hardware, Wi-Fi
    Troubleshooting: Kali-Linux Installation, Repository, Wi-Fi Cards (Official Docs)
    Hardware: Recommended 802.11 Wireless Cards

    Documentation: http://docs.kali.org/ (Offline PDF version)
    Bugs Reporting & Tool Requests: https://bugs.kali.org/
    Kali Tool List, Versions & Man Pages: https://tools.kali.org/

Similar Threads

  1. Armitage Brute Force Password List
    By black_box in forum General Archive
    Replies: 0
    Last Post: 2014-11-16, 06:00

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •