0xma Cyber Security Articles




May 28, 2021

Bruteforce Windows Server SMB Credentials with Medusa

In this tutorial we will see how to bruteforce SMB credentials using a username and password list. This can help us identify users that use common passwords which would make our organization vulnerable to attacks.

Running an nmap scan on the target shows the open ports. We can see that Kerberos (TCP port 88), MSRPC (TCP port 135), NetBIOS-SSN (TCP port 139) and SMB (TCP port 445) are open. This is a good indicator that the target is probably running an Active Directory environment.

nmap scan displays the open ports on the target.

This is our userlist which contains six usernames.

The user list to be bruteforced.

And this is our password list which contains six passwords.

The password list to be bruteforced.

It shows the available options that can be used with medusa.

medusa options available. medusa options available.

We use the -U userlist.txt option to specify the file containing the usernames. The -P passlist.txt option specifies the file containing the passwords. The -h 192.168.43.105 option is used to identify the target box. And lastly, the -M smbnt option specifies the protocol which in this case is SMB. First, it tries all the passwords for the admin user.

medusa with userlist and password list.

Next, it tries the passwords for the Administrator.

medusa with userlist and password list.

Then it tries the passwords for tstark and finds the password.

medusa with userlist and password list.

After that it tries the passwords for pparker and finds the password.

medusa with userlist and password list.

When it comes to srogers, it again tries the passwords in order and finds that NewYork@1 is the valid password.

medusa with userlist and password list.

We can use a password list to bruteforce against a single user. In this case, it found the password for tstark which is LosAngeles@2.

medusa with username and password list.

We can also brute force a bunch of users against a single password. In this case we can see that the srogers user has the NewYork@1 password.

medusa with userlist and a password.

You can follow me on Twitter mujtabareads.