Rednote
GuidebooksTerminalCode
  • Welcome!
  • Utility
    • General
    • Server
    • Transferring File
      • Main
      • Code
      • Miscellaneous
    • Reverse & Bind Shells
      • Havoc
    • Metasploit
    • Service
      • FTP (21)
      • SSH (22)
      • DNS (53)
      • HTTP/HTTPS (80-443)
      • SMTP (25-465-587)
      • POP3 (110-995)
      • IMAP (143-993)
      • MySQL (3306)
      • MSSQL (1433-2433)
      • SMB (139-445)
      • RDP (3389)
      • WinRM (5985-5986)
      • WMI (135)
      • LLMNR & NBT-NS (5355-137)
      • NFS (111-2049)
      • SNMP (161-162)
      • VNC (5900)
      • Rsync (873)
      • R-Service (512-513-514)
      • IPMI (623)
      • Oracle TNS (1521)
  • Pentesting Process
    • Information Gathering
      • Passive
      • Active
      • OSINT
    • Vulnerability
    • Web Attacks
      • GENERAL
      • Crawling/Spidering & Fuzzing
      • Information Disclosure
      • Command Injection
      • Unrestricted File Upload
      • File Inclusion/Path Traversal
      • Request Smuggling
      • Clickjacking
      • Web Cache Poisoning
      • Web Cache Deception
      • Insecure Deserialization
      • Prototype Pollution
      • OAuth 2.0
      • JWT
      • SQLi
        • sqlmap
      • NoSQLi
      • GraphQL
      • XSS
      • SSRF
      • XXE
      • IDOR
      • API
      • SSTI
      • CSRF
      • CORS
      • AJP
      • SSI
      • ESI
      • XSLT
      • Cloud
      • LLM Prompt Security
    • Software Attacks
      • Binary
      • Shellcode
      • AV Evasion & Obfuscation
    • Network Attacks
      • ARP Poisoning
      • Local DNS Cache Poisoning
      • Baby Local DoS
    • Crypto Attacks
      • Utility
      • RSA
      • DSA/DSS
      • PRNG
        • LGC
        • MT
        • LFSR
    • Misc Attacks
    • Social Engineering
    • Password Cracking
      • Wordlist
      • Offline
      • Online
    • Pivoting & Tunneling
    • Local Enumeration
      • Linux
      • Windows
    • Privilege Escalation
      • Linux
        • Linux Privilege Escalation with Groups
        • Linux Privilege Escalation with Library
      • Windows
        • Windows Privilege Escalation with Groups and Privileges
        • Windows Privilege Escalation with DLL Hijacking
    • Active Directory
      • Enumeration
      • Abuse ACL
      • Extract Hash & Password
      • Pass The Hash
      • Pass The Ticket
      • Overpass the Hash
      • Relay Attack
      • Password Spraying Attack
      • AS-REP Roasting
      • Kerberoasting
      • Silver Ticket
      • Golden Ticket
      • DC Synchronization
      • AD Certificates
      • Attacking Domain Trusts
    • Reports
      • Bug Bounty Report
    • CVE
      • Linux
      • Windows
    • OTHER
      • CMS
        • WordPress
        • Joomla
        • Drupal
      • Tomcat
      • Jenkins
      • Splunk
      • Web Service
      • Navigating Python Objects
      • JavaScript Deobfuscation
  • Extra
    • My Books
    • My Exploits
    • Compiled Binaries
Powered by GitBook
On this page
  • Public Wordlists
  • Default Credentials
  • Wordlist Generation
  • Leaks
  • Filtering wordlist
  • Infer Policy
  • Filter Wordlist
  • Edit Wordlist

Was this helpful?

  1. Pentesting Process
  2. Password Cracking

Wordlist

Public Wordlists and Wordlist Generation.

Last updated 8 months ago

Was this helpful?

Public Wordlists

Wordlists
Details

Website with collection of password lists for various purposes. See also API.

Collection of multiple types of lists.

Default Credentials

Tool
Details

Default credentials collected from multiple sources. creds update

creds search <STRING> [export]

Wordlist Generation

Tool
Details

crunch <MIN> <MAX> <CHARSET> [-t <PATTERN> -o <OUTPUT>] , for all uppercase letters @ for all lowercase letters % for all numeric characters ^ for all special characters CONST

Wordlists based on the content of websites. cewl http://<IP> -w <OUTPUT> -d <DEEP> -m <MIN> -x <MAX> --with-numbers --lowercase

Wordlists based on the profiling of a user. cupp -i

A powerful and useful hacker dictionary builder. pydictor -sedb

Tool for generating possible usernames. username-anarchy <NAME> username-anarchy -i <FILE_NAMES>

Performs various manipulations on a wordlist. rsmangler.rb -f <WORDLIST>

Apply rules to a wordlist hashcat -r <RULE_FILE> --stdout <WORDLIST>

Tool
Details

Graphical tool for generating custom wordlists that allows you to apply various rules.

An overpower wordlist generator, splitter, merger, finder, saver, create words permutation and combinations, apply different encoding/decoding, etc.

Leaks

Searching for sensitive information via data breach

Filtering wordlist

It is very important to generate and use a wordlists that meets the password requirements and policy.

Infer Policy

You can infer the password complexity policy in use on the target in the following ways:

  • Using the user registration form.

  • If policy is provided on first error, and if policy is provided after n attempts.

  • guess policy by trial and error, i.e., start with complex and appropriate password and then remove components to see if they are needed.

Filter Wordlist

To filter the wordlist you can use grep

Command
Details

grep [-v] '[[:classname:]]' <WORDLIST>

Based on what they contain. -v (NOT contain)

grep -x '.\{<LEN>\}’

Of exact length <LEN>

grep -E '^.{<MIN>,<MAX>}$'

Of length between <MIN> and <MAX>

grep -E '^.{6,}$' <WORDLIST> | grep -E '[A-Z]' | grep -E '[a-z]' | grep -E '[0-9]' | grep -E '([!@#$%^&*].*){2,}' > <OUTPUT_FILE>

Concatenation

Classname
Details

[[:graph:]]

All printable characters except spaces and control characters.

[[:lower:]]

All lowercase letters of the alphabet.

[[:print:]]

All printable characters, including spaces.

[[:punct:]]

All punctuation characters, such as commas, periods, semicolons, etc.

[[:space:]]

All spacing characters, including spaces, tabs, line feeds, etc.

[[:upper:]]

All capital letters of the alphabet.

[[:digit:]]

All digits, from 0 to 9

[[:xdigit:]]

All characters that are hexadecimal digits, that is, 0 to 9 and A to F (or a-f).

Edit Wordlist

Or edit the wordlist with sed

Command
Details

sed -ri '/^.{,7}$/d' <WORDLIST>

Remove shorter than 8

sed -ri '/[!-/:-@\[-`\{-~]+/!d' <WORDLIST>

Remove no special chars

sed -ri '/[0-9]+/!d' <WORDLIST>

Remove no numbers

sed -ri '/[A-Z]/!d' <WORDLIST>

Remove no uppercase

sed -ri '/[a-z]/!d' <WORDLIST>

Remove no lowercase

sed -r '/^.{,7}$/d' <WORDLIST> | sed -r '/[!-/:-@\[-`\{-~]+/!d' | sed -r '/[0-9]+/!d' >> <OUTPUT>

Concatenation

CIRT.NET
SecList
SCADAPASS
Router
Passgen (Weakpass) 1
Passgen (Weakpass) 2
HaveIBeenPwned
DeHashed
Weakpass
SecLists
DefaultCreds-cheat-sheet
crunch
CeWL
cupp
pydictor
username-anarchy
RSMangler
hashcat
mentalist
cook