In the previous section, we discussed several tools that can be used to crack passwords in the offline mode. In this section, we will discuss some password attacking tools that must be used while you are connected to the target machine.
We will discuss the tools that can be used for the following purposes:
- Generating wordlists
- Finding the password hash
- Online password attack tool
The first two tools are used to generate wordlists from the information gathered in the target website, while the other one is used to search the password hash in the online password hash service database.
The online password attack tool will try to log into the remote service, just like a user login, using the credentials provided. The tool will try to log in many times until the correct credentials are found.
The drawback of this technique is that, because you connect directly to the target server, your action may be noticed and blocked. Also, because the tool utilizes the login process, it will take longer to run compared to the offline attack tools.
Even though the tool is slow and may trigger a blocking mechanism, network services such as SSH, Telnet, and FTP usually can't be cracked using offline password-cracking tools. You may want to be very careful when doing an online password attack; in particular, when you brute-force an Active Directory (AD) server, you may block all of the user accounts. You need to check the password and lockout policy first, and then try only one password for all accounts, so you do not end up blocking accounts.